Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Abusing GitHub Notifications to Deliver Phishing Emails

Hackers Abusing GitHub Notifications to Deliver Phishing Emails

Posted on September 23, 2025September 23, 2025 By CWS

In current weeks, safety researchers have uncovered an elaborate phishing marketing campaign that leverages authentic GitHub notification mechanisms to ship malicious content material.

Victims obtain seemingly genuine repository alerts, full with real-looking commit messages and collaborator updates. Upon nearer inspection, the notification headers reveal altered sender addresses and obfuscated hyperlinks.

The marketing campaign’s sophistication has allowed it to slide previous many e-mail gateways, resulting in a surge in compromised credentials amongst builders and IT workers.

Preliminary reviews emerged when a number of open-source maintainers reported surprising password resets and unauthorized repository forks. H4x0r.DZ recognized the malware variant accountable for intercepting GitHub webhook notifications and appending phishing payloads.

Not like typical phishing emails, these messages preserve legitimate DKIM and SPF information by exploiting misconfigurations in third-party GitHub Apps.

Recipients clicking the embedded hyperlink are redirected via a series of URL shorteners earlier than touchdown on a credential-harvesting web page.

Evaluation of the phishing emails reveals that the malware injects customized HTML kinds into the GitHub notification template.

Notification kind (Supply – X)

The shape’s motion attribute factors to a URL underneath the attacker’s management, whereas JavaScript code captures the entered credentials and relays them by way of an AJAX POST request.

An infection Mechanism by way of Webhook Manipulation

The core an infection vector hinges on compromised GitHub Apps with overly broad webhook permissions.

Attackers first determine fashionable repositories that enable exterior Apps to subscribe to push occasions.

By registering a malicious App underneath a believable title, they acquire occasion subscriptions and purchase a webhook secret.

The attacker’s server validates incoming JSON payloads utilizing the key, then modifies the “pusher” area to insert malicious HTML earlier than forwarding the notification to GitHub’s e-mail service.

A simplified model of the injection logic seems under:-

perform modifyPayload(payload) {
let template = payload. Physique;
const phishingForm = “;
payload. Physique = template.exchange(‘

Cyber Security News Tags:Abusing, Deliver, Emails, GitHub, Hackers, Notifications, Phishing

Post navigation

Previous Post: GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
Next Post: Scattered Spider Suspect Arrested in US

Related Posts

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT Cyber Security News
Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access Cyber Security News
Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data Cyber Security News
BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized Cyber Security News
FreePBX SQL Injection Vulnerability Exploited to Modify The Database FreePBX SQL Injection Vulnerability Exploited to Modify The Database Cyber Security News
North Korean Operatives Exploit LinkedIn for Remote Tech Jobs North Korean Operatives Exploit LinkedIn for Remote Tech Jobs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark