top of page

Pattern 38 Impact: How We Protected 2 Million Open Source Users

  • Writer: Patrick Duggan
    Patrick Duggan
  • Dec 3, 2025
  • 4 min read

--- title: "Pattern 38 Impact: How We Protected 2 Million Open Source Users" slug: pattern-38-impact-2-million-users-protected date: 2025-12-03 author: Patrick Duggan tags: [threat-intelligence, supply-chain, github, malware, impact-assessment] category: Threat Intelligence featured: true ---


TL;DR: Our Pattern 38 supply chain attack detection has protected an estimated 2-4 million open source users by identifying and reporting malware distribution campaigns targeting 194,000+ starred repositories.


The Numbers



═══════════════════════════════════════════════════════════════
          PATTERN 38 SUPPLY CHAIN IMPACT ASSESSMENT            
═══════════════════════════════════════════════════════════════


TOTAL GITHUB STARS PROTECTED: 194,604 ⭐ ESTIMATED USERS PROTECTED: 2-4 MILLION MALWARE ACCOUNTS REPORTED: 15 THREAT ACTORS SUSPENDED: 6 HIGH-VALUE REPOS DEFENDED: 8 ═══════════════════════════════════════════════════════════════ ```


High-Value Targets We Protected


These aren't random repos. These are critical open source infrastructure:


| Project | Stars | What It Does | Why Attackers Wanted It | |---------|-------|--------------|------------------------| | zed-industries/zed | 70,773 | Modern IDE | Developers = high-value targets | | oobabooga/text-generation-webui | 45,537 | AI/ML interface | AI researchers have GPU farms | | paperless-ngx | 34,640 | Document management | Contains sensitive documents | | calibre-web | 16,011 | Ebook server | Self-hosters = technical users | | esphome | 10,154 | IoT firmware | Access to home networks | | atproto (Bluesky) | 8,938 | Social protocol | Developer credentials | | Ultimaker/Cura | 6,788 | 3D printing | Maker community | | ScoopInstaller | 1,763 | Windows packages | Package manager = trust |


The Attack Pattern


Pattern 38 is elegantly simple:



mermaid
flowchart TD
    A[Create GitHub Account] --> B[Fork Popular Repos]
    B --> C[Find Active Issues]
    C --> D[Post 'Helpful' Comment]
    D --> E[Include ZIP Download Link]
    E --> F[Victim Downloads]
    F --> G[Extracts & Runs]
    G --> H[Stealc/Rhadamanthys Executes]
    H --> I[Credentials Stolen]
    
    style E fill:#d73a49,color:#fff
    style H fill:#000,color:#fff


The attackers lurk in GitHub issues, waiting for frustrated users asking for help. Then they swoop in with "I had the same problem! This fixed it for me: [malicious ZIP]"


What We Found Today


Wave 1: The Heavy Hitters


| Account | Type | Reach | Status | |---------|------|-------|--------| | muneebwanee | Spyware dev | 537⭐, 492 followers | 🔴 ACTIVE | | MEIBOMUIS | Crypto drainer MaaS | Telegram sales | 🔴 ACTIVE | | BLACKHAWKS472 | Malware factory | 62 repos | 🔴 ACTIVE | | teslafunds | RedLine distributor | 7yr account | ✅ SUSPENDED |


Wave 2: Network Discovery


By following who follows who, we found a network:



mermaid
flowchart LR
    A[Sliaswrk<br/>HVNC Toolkit] -->|follower| B[saxophone007]
    B -->|hosts| C[Cobalt Strike Source]
    B -->|hosts| D[XWorm RAT Source]
    B -->|hosts| E[CVE Exploits]
    
    style A fill:#d73a49,color:#fff
    style B fill:#d73a49,color:#fff
    style C fill:#000,color:#fff



• APT29 (Russian SVR)

• APT41 (Chinese MSS)

• Conti, LockBit, BlackCat ransomware


The Full Malware Ecosystem



mermaid
mindmap
  root((Malware Network))
    Spyware
      muneebwanee
        Dash 537⭐
        InstaReporter 228⭐
    Crypto Drainers
      MEIBOMUIS
        Telegram @MIOBOMUIS
        5 drainer repos
      Thrbvbb
        Created yesterday
        OKX/Exodus/MetaMask
    RATs
      Trinitysudo
        HALCYON-RAT
        AV Evasion
      Sliaswrk
        ICARUS-HVNC
        S500-RAT
        Pandora-HVNC Source
    APT Tooling
      saxophone007
        Cobalt Strike Beacon
        XWorm v5.6 Source
    Malware Factory
      BLACKHAWKS472
        62 repos
        cyberstealer.vft
        FukedxRat.vft


How We Calculate Impact


GitHub Stars → Users multiplier: 10-20x



• Users who bothered to click a button

• A fraction of actual clones/downloads

• Nothing about npm/pip installs from these projects



• 45,537 stars

• But it's THE interface for running local LLMs

• Actual users easily 500,000+


What Happens When Pattern 38 Succeeds


The Stealc/Rhadamanthys payload steals:



✓ Browser passwords (Chrome, Firefox, Edge, Brave)
✓ Crypto wallets (MetaMask, Exodus, Coinbase, 40+ others)
✓ Discord tokens (account takeover)
✓ Telegram sessions
✓ VPN configs (NordVPN, ProtonVPN, OpenVPN)
✓ FTP credentials
✓ SSH keys
✓ 2FA backup codes



• GitHub tokens

• AWS/GCP/Azure credentials

• npm/PyPI publish tokens

• Private SSH keys

• `.env` files with API keys


Our Detection Pipeline



mermaid
flowchart TD
    subgraph "Daily Scan (06:00 UTC)"
        A[Pattern 38 Scanner] --> B[GitHub API]
        B --> C[Account Analysis]
        C --> D[Cultural Signatures]
        D --> E[Bot Detection]
    end
    
    subgraph "Enrichment"
        E --> F[OSINT Gathering]
        F --> G[VirusTotal Lookup]
        G --> H[Network Mapping]
    end
    
    subgraph "Response"
        H --> I[GitHub Report]
        H --> J[OTX Pulse]
        H --> K[STIX Bundle]
        H --> L[Blog Post]
    end
    
    style I fill:#28a745,color:#fff
    style J fill:#0088cc,color:#fff


The Suspension Scoreboard


| Account | Reported | Suspended | Time to Action | |---------|----------|-----------|----------------| | FireSuper | Nov 23 | Nov 24 | ~24 hours | | rampubg14-cmyk | Nov 23 | Nov 24 | ~24 hours | | anuxagfr | Nov 23 | Nov 24 | ~24 hours | | winchmrsmilegodsgf | Nov 23 | Nov 24 | ~24 hours | | teslafunds | Dec 3 | Dec 3 | Same day! |


GitHub is responding. When we send detailed reports with evidence, they act.


Today's Reports Sent


10 individual reports to [email protected]:


1. `DUSA-2025-1203-MUNEEB-001` - muneebwanee (Spyware) 2. `DUSA-2025-1203-MEIBO-001` - MEIBOMUIS (Crypto Drainer MaaS) 3. `DUSA-2025-1203-TRIN-001` - Trinitysudo (HALCYON-RAT) 4. `DUSA-2025-1203-BHAWK-001` - BLACKHAWKS472 (62 repo malware factory) 5. `DUSA-2025-1203-WINNTI-001` - getlook23 (Potential APT C2) 6. `DUSA-2025-1203-REDLINE-001` - teslafunds (RedLine) ✅ SUSPENDED 7. `DUSA-2025-1203-THRBVBB-001` - Thrbvbb (Crypto Drainer) 8. `DUSA-2025-1203-SLIASWRK-001` - Sliaswrk (HVNC Toolkit) 9. `DUSA-2025-1203-BATCH2-001` - 4 new accounts 10. `DUSA-2025-1203-SAX007-001` - saxophone007 (Cobalt Strike)


Get the IOCs


OTX: otx.alienvault.com/user/pduggusa


STIX Feed: analytics.dugganusa.com/api/v1/stix-feed



• Pattern 42 Reblessing: GitHub Malware Developer Network

• GitHub Malware Distribution - Dec 2-3, 2025 (Pattern 38)

• Pattern 41+38 Hybrid: Zeeeepa Bot Farm + Malware Factory

• GitHub RAT Builder Ecosystem


The Philosophy


> "Feed subscribers get IOCs first. Bad actors get public shaming second."


We publish IOCs immediately to OTX and our STIX feed. Defenders get actionable intelligence before we write blog posts. The goal is protection, not clout.


What You Can Do


1. Star hygiene: Don't trust repos just because they have stars 2. Issue skepticism: Be wary of "helpful" comments with download links 3. ZIP paranoia: Never run executables from GitHub issue comments 4. Report suspicious activity: [email protected] actually responds




*Pattern 38 detection is automated and runs daily at 06:00 UTC. Results feed into OTX within minutes. This is what "threat intelligence at machine speed" looks like.*


DugganUSA LLC - Minnesota-based threat intelligence



Get Free IOCs

Subscribe to our threat intelligence feeds for free, machine-readable IOCs:

AlienVault OTX: https://otx.alienvault.com/user/pduggusa

STIX 2.1 Feed: https://analytics.dugganusa.com/api/v1/stix-feed


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page