Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer

Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer

Posted on January 27, 2026January 27, 2026 By CWS

Cybercriminals have found a harmful method to trick builders into downloading malware by exploiting how GitHub works.

The assault includes creating faux variations of the GitHub Desktop installer and making them seem professional to unsuspecting customers.

Between September and October 2025, this marketing campaign primarily focused customers in Europe and the European Financial Space, although infections unfold to Japan and different areas.

The malware, disguised as a regular improvement device installer, represents a critical risk to builders who depend on GitHub for his or her each day work.

The assault chain begins when criminals create throwaway GitHub accounts and fork the official GitHub Desktop repository.

They then modify the obtain hyperlinks within the README file to level towards their malicious installer as a substitute of the professional one. Utilizing sponsored commercials focusing on searches for “GitHub Desktop,” attackers promote these contaminated information to builders.

An infection Chain (Supply – GMO Cybersecurity)

The criminals exploit a characteristic in GitHub’s design that enables commits from forked repositories to stay seen underneath the official repository’s namespace, even after the unique fork or account is deleted.

This method, known as repo squatting, makes it extraordinarily troublesome for GitHub to trace and take away malicious content material.

GMO Cybersecurity analysts recognized that this marketing campaign represents an adaptive, ongoing risk that continues evolving.

The malicious Home windows installer detected by the researchers, named GitHubDesktopSetup-x64.exe with a file measurement of 127.68 megabytes, serves as a multi-stage loader.

.NET software (Supply – GMO Safety)

Comparable malicious samples have been found disguised underneath different software names together with Chrome, Notion, 1Password, and Bitwarden installers courting again to Could 2025.

Analyzing the An infection Mechanism and Superior Evasion Ways

The an infection mechanism reveals subtle technical deception.

The malicious installer seems as a regular C++ software on the floor, however evaluation of its debug info reveals it’s truly a single-file .NET software bundled right into a single executable known as an AppHost.

OpenCL Shenanigans (Supply – GMO Safety)

The precise malicious .NET payload hides throughout the file’s overlay part, making it invisible to easy scanning instruments.

What makes this notably regarding is that the malware incorporates a GPU-based API known as OpenCL to intentionally forestall evaluation in commonplace sandbox environments.

HijackLoader (Supply – GMO Safety)

Most safety testing sandboxes and digital machines lack GPU drivers or OpenCL assist, forcing safety researchers to conduct evaluation on precise bodily machines with actual graphics {hardware} earlier than understanding the malware’s true habits.

This method, dubbed GPUGate, represents deliberate anti-analysis safety designed to decelerate safety researchers.

Moreover, the malware deliberately makes use of code misdirection ways to confuse analysts making an attempt to get better the decryption keys statically.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Desktop, Distribute, GitHub, Hijacking, Installer, Malware, Official, Repository

Post navigation

Previous Post: Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
Next Post: Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Related Posts

Hackers Actively Exploiting AI Deployments Hackers Actively Exploiting AI Deployments Cyber Security News
Microsoft Unveils Threat from North Korean IT Imposters Microsoft Unveils Threat from North Korean IT Imposters Cyber Security News
Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware Cyber Security News
Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines Cyber Security News
Starbucks Faces Cyber Breach: 10GB Data Allegedly Stolen Starbucks Faces Cyber Breach: 10GB Data Allegedly Stolen Cyber Security News
Npm Ecosystem Hit by New Worm Targeting Developer Secrets Npm Ecosystem Hit by New Worm Targeting Developer Secrets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark