
Imposter Repos: Phishing Software Engineers on GitHub
Netragard was approached by a software development firm to emulate a threat actor attempting to gain access to their Intellectual Property (IP) through social engineering. The client specifically requested a black-box approach, targeting the company’s software engineers. A black-box approach involves starting the engagement without any prior information, simulating a threat actor operating with real-world resources. In this article, we delve into how we crafted a convincing social engineering campaign, hosted Command and Control (C2)




