Skip to content
.ca
5 minhigh

Attackers Are Impersonating a Linux Foundation Leader in Slack to Target Open Source Developers

A high-severity social engineering campaign is actively targeting open source developers on Slack by impersonating Linux Foundation leaders. The multi-stage attack uses a fake AI tool lure to harvest credentials and trick victims into installing a malicious root certificate, leading to traffic interception and malware execution on macOS and Windows systems.

Sens:ImmediateConf:highAnalyzed:2026-04-09reports

Authors: Socket

ActorsDPRK-nexus threat actor

Source:Socket

IOCs · 2

Key Takeaways

  • Attackers are impersonating Linux Foundation leaders on Slack to target open source developers.
  • The attack uses a fake AI tool pitch to lure victims to a malicious Google Sites page.
  • Victims are tricked into installing a malicious root certificate to intercept encrypted traffic.
  • On macOS, the attack downloads and executes a malicious binary named 'gapi' from a remote IP.
  • The campaign exploits developer trust and utilizes legitimate infrastructure to bypass casual inspection.

Affected Systems

  • macOS
  • Windows
  • Slack

Attack Chain

The attacker impersonates a trusted community leader on Slack and sends a direct message pitching a fake AI tool. The message contains a link to a malicious Google Sites page where the victim undergoes a fake authentication flow to harvest their email and verification code. The victim is then prompted to install a malicious root certificate, which enables interception of encrypted traffic. On macOS, a script subsequently downloads and executes a malicious binary named 'gapi' from a remote IP, potentially leading to full system compromise.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

The article does not provide specific detection rules, but shares actionable IOCs such as IPs, URLs, and file names for custom rule creation.

Detection Engineering Assessment

EDR Visibility: High — EDR solutions should easily detect the installation of unauthorized root certificates and the execution of the unknown 'gapi' binary on macOS. Network Visibility: Medium — The initial phishing link uses legitimate Google Sites infrastructure, making network detection difficult, but the subsequent download from the bare IP 2.26.97.61 is highly visible. Detection Difficulty: Moderate — The social engineering aspect and use of legitimate infrastructure (Google Sites) make initial detection hard, but the installation of a root certificate and execution of a binary from a bare IP provide solid detection opportunities.

Required Log Sources

  • Endpoint process creation logs
  • Certificate store modification logs
  • Network connection logs
  • Web proxy logs

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Look for unexpected modifications to the system root certificate store, particularly certificates claiming to be from Google.Endpoint certificate store logsDefense EvasionLow
Search for network connections to the IP address 2.26.97.61, especially those initiated by scripts or unknown binaries.Network connection logsExecutionLow
Identify the execution of a binary named 'gapi' on macOS systems, particularly if downloaded from an external source.Endpoint process creation logsExecutionLow

Control Gaps

  • Lack of out-of-band verification for Slack communications
  • Inability to block malicious content hosted on legitimate services like Google Sites

Key Behavioral Indicators

  • Installation of unauthorized root certificates
  • Execution of the 'gapi' binary
  • Network traffic to 2.26.97.61

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Block access to the IP address 2.26.97.61.
  • Search endpoint logs for the execution of the 'gapi' binary or installation of suspicious root certificates.
  • If affected, disconnect from the network, remove newly installed certificates, rotate all credentials, and revoke active sessions.

Infrastructure Hardening

  • Enforce Multi-Factor Authentication (MFA) on all developer and collaboration accounts.
  • Implement strict controls and monitoring around modifications to the system root certificate store.

User Protection

  • Deploy endpoint security solutions capable of detecting unauthorized certificate installations and suspicious binary executions.

Security Awareness

  • Train developers to verify identities out-of-band when receiving unusual requests on Slack or other collaboration platforms.
  • Educate users to never install root certificates from links or unexpected prompts.
  • Warn users against executing downloaded binaries or scripts from unverified sources.

MITRE ATT&CK Mapping

  • T1566.002 - Phishing: Spearphishing Link
  • T1584.001 - Compromise Infrastructure: Domains
  • T1553.004 - Subvert Trust Controls: Install Root Certificate
  • T1557 - Adversary-in-the-Middle
  • T1059.004 - Command and Scripting Interpreter: Unix Shell

Additional IOCs

  • Ips:
    • 2[.]26[.]97[.]61 - Remote IP address hosting the malicious macOS binary.
  • Domains:
    • sites[.]google[.]com - Legitimate domain abused to host the phishing page.
  • Urls:
    • hxxps://sites[.]google[.]com/view/workspace-business/join - Phishing URL used in the Slack lure.
  • Other:
    • cra@nmail.biz - Fake email address provided in the phishing lure.
    • CDRX-NM71E8T - Access key used in the fake authentication flow.