Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New PyStoreRAT Malware Targets IT and OSINT Experts

New PyStoreRAT Malware Targets IT and OSINT Experts

Posted on February 9, 2026 By CWS

A new and sophisticated cyber threat is making waves by targeting Information Technology (IT) administrators and Open Source Intelligence (OSINT) professionals. This attack utilizes trusted platforms like GitHub to disseminate a covert backdoor known as PyStoreRAT. Unlike traditional attacks, this operation is meticulously planned, using dormant accounts to distribute malicious software without raising alarms.

Exploiting GitHub’s Reputation

The attackers reactivated long-dormant GitHub accounts, likely to capitalize on their established credibility. These accounts began releasing polished, AI-generated software projects. Often masquerading as helpful tools, such as cryptocurrency bots and security utilities, these repositories quickly gained attention. The use of AI-generated content allows the attackers to fill these repositories with seemingly legitimate code, making them more convincing to potential victims.

Identification and Impact

Security researchers from Morphisec discovered this campaign when they noticed several of these repositories climbing GitHub’s trending lists. This increased visibility placed the malicious tools in front of their target audience. As these repositories gained trust in the community, the attackers introduced subtle updates containing the previously unknown PyStoreRAT backdoor. This malware is engineered for long-term persistence and data theft, with capabilities to profile systems and deploy additional payloads, such as the Rhadamanthys stealer, which can exfiltrate sensitive data.

Adaptive Evasion Techniques

One of PyStoreRAT’s standout features is its adaptability to different security environments. The malware checks for specific antivirus products, such as CrowdStrike Falcon and ReasonLabs. Upon detection, it modifies its execution methods to bypass these defenses. Additionally, the command-and-control (C2) infrastructure supporting this campaign is designed for resilience. It employs a rotating set of nodes for seamless updates, complicating efforts to dismantle the operation. Linguistic artifacts within the code, like Russian language strings, hint at the malware’s geographic origin or intended target.

Experts suggest using behavior-based defense strategies, which do not rely solely on static signatures, to effectively detect and mitigate this evolving threat. Staying informed and adapting security measures are crucial steps in safeguarding against such advanced cyber attacks.

Cyber Security News Tags:AI-generated, command-and-control, cyber attack, Cybersecurity, data theft, GitHub, IT security, Malware, network security, OSINT, PyStoreRAT, Ransomware, Rhadamanthys stealer, supply chain attack

Post navigation

Previous Post: Hackers Target SolarWinds Vulnerability to Deploy Tools
Next Post: Telegram Users Targeted by Advanced Phishing Scheme

Related Posts

ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns Cyber Security News
New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT Cyber Security News
Cyber Startup Frenetik Launches Patented Deception Technology to Counter the AI Arms Race Cyber Startup Frenetik Launches Patented Deception Technology to Counter the AI Arms Race Cyber Security News
Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware Cyber Security News
Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects Cyber Security News
Coinbase Cartel’s Data Theft Tactics Threaten High-Value Industries Coinbase Cartel’s Data Theft Tactics Threaten High-Value Industries Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News