Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New PyStoreRAT Malware Targets IT and OSINT Experts

New PyStoreRAT Malware Targets IT and OSINT Experts

Posted on February 9, 2026 By CWS

A new and sophisticated cyber threat is making waves by targeting Information Technology (IT) administrators and Open Source Intelligence (OSINT) professionals. This attack utilizes trusted platforms like GitHub to disseminate a covert backdoor known as PyStoreRAT. Unlike traditional attacks, this operation is meticulously planned, using dormant accounts to distribute malicious software without raising alarms.

Exploiting GitHub’s Reputation

The attackers reactivated long-dormant GitHub accounts, likely to capitalize on their established credibility. These accounts began releasing polished, AI-generated software projects. Often masquerading as helpful tools, such as cryptocurrency bots and security utilities, these repositories quickly gained attention. The use of AI-generated content allows the attackers to fill these repositories with seemingly legitimate code, making them more convincing to potential victims.

Identification and Impact

Security researchers from Morphisec discovered this campaign when they noticed several of these repositories climbing GitHub’s trending lists. This increased visibility placed the malicious tools in front of their target audience. As these repositories gained trust in the community, the attackers introduced subtle updates containing the previously unknown PyStoreRAT backdoor. This malware is engineered for long-term persistence and data theft, with capabilities to profile systems and deploy additional payloads, such as the Rhadamanthys stealer, which can exfiltrate sensitive data.

Adaptive Evasion Techniques

One of PyStoreRAT’s standout features is its adaptability to different security environments. The malware checks for specific antivirus products, such as CrowdStrike Falcon and ReasonLabs. Upon detection, it modifies its execution methods to bypass these defenses. Additionally, the command-and-control (C2) infrastructure supporting this campaign is designed for resilience. It employs a rotating set of nodes for seamless updates, complicating efforts to dismantle the operation. Linguistic artifacts within the code, like Russian language strings, hint at the malware’s geographic origin or intended target.

Experts suggest using behavior-based defense strategies, which do not rely solely on static signatures, to effectively detect and mitigate this evolving threat. Staying informed and adapting security measures are crucial steps in safeguarding against such advanced cyber attacks.

Cyber Security News Tags:AI-generated, command-and-control, cyber attack, Cybersecurity, data theft, GitHub, IT security, Malware, network security, OSINT, PyStoreRAT, Ransomware, Rhadamanthys stealer, supply chain attack

Post navigation

Previous Post: Hackers Target SolarWinds Vulnerability to Deploy Tools
Next Post: Telegram Users Targeted by Advanced Phishing Scheme

Related Posts

Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack Cyber Security News
Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins Cyber Security News
Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information Cyber Security News
CISA Highlights Notepad++ Vulnerability Amid Active Exploits CISA Highlights Notepad++ Vulnerability Amid Active Exploits Cyber Security News
3 SOC Metrics Improved With Sandbox Analysis  3 SOC Metrics Improved With Sandbox Analysis  Cyber Security News
AWS Middle East Outage Disrupts EC2 and Networking Services AWS Middle East Outage Disrupts EC2 and Networking Services Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark