Site icon The Cybersecurity Daily News

GitHub Tightens Security Policies For Removing Malicious Executables

GitHub

CyberDaily: Cybersecurity news-

In the latest developments, GitHub has formally announced a range of updates in their policies that regulates and handles the exploit codes and malware that get posted on the platform.

GitHub taking measures against abuse of platform:

The code-hosting Platform noted that they categorically allow dual-use technologies and research related to malware, exploits, and vulnerabilities on their platform.  “We understand that many security research projects on GitHub are dual-use and broadly beneficial to the security community. We assume positive intention and use of these projects to promote and drive improvements across the ecosystem.” provided GitHub.

The code repository platform also stated that they might take additional measures to obstruct ongoing cyber activities and attack that mal-utilize the GitHub platform as a malware content delivery network (CDN).

To meet the required prevention measures, GitHub users are prohibited from uploading, posting, or transmitting any type of content that might be cyber-critical or malicious.

This type of content can be mal-utilized to deliver or deploy malicious executables or abuse the code hosting platform, adding an attack infrastructure by coordinating DoS attacks to manage command-to-control (C2) servers.

“Technical harm means overconsumption of resources, physical damage, downtime, denial of service, or data loss, with no implicit or explicit dual-use purpose prior to the abuse occurring,” GitHub said.

Also read,

GitHub statements for newer policies:

Measures following criticism for removal of important PoC:

GitHub says that in a case where there is an active abuse of dual-use content, they might also abstain access to such content by placing it behind authentication walls while in extreme cases, disable access or remove it altogether. 

The newest, stricter policies of the GitHub platform come after the widespread criticism that the platform faced when a  proof-of-concept (PoC) exploit code was removed from the platform in March 2021.

The code, uploaded by a security researcher, included a set of security flaws known as ProxyLogon that Microsoft disclosed were being abused by Chinese state-sponsored hacking groups to breach Exchange servers worldwide. 

GitHub at the time said it removed the PoC in accordance with its acceptable use policies, citing it included code “for a recently disclosed vulnerability that is being actively exploited.”

Exit mobile version