Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
“GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

“GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Posted on September 6, 2025September 6, 2025 By CWS

A complicated malware marketing campaign, dubbed “GPUGate,” abuses Google Advertisements and GitHub’s repository construction to trick customers into downloading malicious software program.

The Arctic Wolf Cybersecurity Operations Middle, the assault chain makes use of a novel method to evade safety evaluation by leveraging a pc’s Graphics Processing Unit (GPU).

The marketing campaign seems to be the work of a Russian-speaking menace actor and is actively focusing on IT professionals in Western Europe.

The assault begins with malicious promoting, the place attackers place a sponsored advert on the prime of Google search outcomes for phrases like “GitHub Desktop.” This advert directs customers to what seems to be a professional GitHub web page.

Google search outcomes for GitHub Desktop

In actuality, the hyperlink results in a particular, manipulated “commit” web page inside a repository. This web page appears to be like genuine, retaining the repository’s title and metadata, however comprises altered obtain hyperlinks that time to an attacker-controlled area.

This “belief bridge” exploits the person’s confidence in each Google and GitHub to ship the malicious payload.

What makes GPUGate notably notable is its distinctive evasion technique. The preliminary installer is a big 128 MB file, designed to bypass safety sandboxes that always have file measurement limits.

weaponized GitHub Desktop

Its most modern function is a GPU-gated decryption routine. The malware will solely decrypt its malicious payload if it detects an actual, bodily GPU with a tool title longer than ten characters, Arctic Wolf stated.

It is a deliberate tactic to thwart evaluation, because the digital machines and sandboxes utilized by safety researchers usually have generic, brief GPU names or no GPU in any respect. On such techniques, the payload stays encrypted and inert.

The first objective of this marketing campaign is to achieve preliminary entry to organizational networks for malicious actions, together with credential theft, knowledge exfiltration, and ransomware deployment.

By focusing on builders and IT employees, people prone to search instruments like GitHub Desktop, the attackers purpose for victims with elevated community privileges.

As soon as executed, the malware makes use of a PowerShell script to achieve administrative rights, create scheduled duties for persistence, and add exclusions to Home windows Defender to keep away from detection. The marketing campaign has been energetic since not less than December 2024 and represents an evolving and vital menace.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Abuses, Ads, Advanced, Deliver, GitHub, Google, GPUGate, Malware, Payload

Post navigation

Previous Post: Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
Next Post: Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign

Related Posts

China-Linked Group Targets Exchange Servers with Malware China-Linked Group Targets Exchange Servers with Malware Cyber Security News
MuddyWater APT Weaponizing Word Documents to Deliver ‘RustyWater’ Toolkit Evading AV and EDR Tools MuddyWater APT Weaponizing Word Documents to Deliver ‘RustyWater’ Toolkit Evading AV and EDR Tools Cyber Security News
RevengeHotels Leveraging AI To Attack Windows Users With VenomRAT RevengeHotels Leveraging AI To Attack Windows Users With VenomRAT Cyber Security News
Massive “Shai-Halud” Supply Chain Attack Compromised 477 NPM Packages Massive “Shai-Halud” Supply Chain Attack Compromised 477 NPM Packages Cyber Security News
SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes Cyber Security News
VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark