Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New PyStoreRAT Malware Targets IT and OSINT Experts

New PyStoreRAT Malware Targets IT and OSINT Experts

Posted on February 9, 2026 By CWS

A new and sophisticated cyber threat is making waves by targeting Information Technology (IT) administrators and Open Source Intelligence (OSINT) professionals. This attack utilizes trusted platforms like GitHub to disseminate a covert backdoor known as PyStoreRAT. Unlike traditional attacks, this operation is meticulously planned, using dormant accounts to distribute malicious software without raising alarms.

Exploiting GitHub’s Reputation

The attackers reactivated long-dormant GitHub accounts, likely to capitalize on their established credibility. These accounts began releasing polished, AI-generated software projects. Often masquerading as helpful tools, such as cryptocurrency bots and security utilities, these repositories quickly gained attention. The use of AI-generated content allows the attackers to fill these repositories with seemingly legitimate code, making them more convincing to potential victims.

Identification and Impact

Security researchers from Morphisec discovered this campaign when they noticed several of these repositories climbing GitHub’s trending lists. This increased visibility placed the malicious tools in front of their target audience. As these repositories gained trust in the community, the attackers introduced subtle updates containing the previously unknown PyStoreRAT backdoor. This malware is engineered for long-term persistence and data theft, with capabilities to profile systems and deploy additional payloads, such as the Rhadamanthys stealer, which can exfiltrate sensitive data.

Adaptive Evasion Techniques

One of PyStoreRAT’s standout features is its adaptability to different security environments. The malware checks for specific antivirus products, such as CrowdStrike Falcon and ReasonLabs. Upon detection, it modifies its execution methods to bypass these defenses. Additionally, the command-and-control (C2) infrastructure supporting this campaign is designed for resilience. It employs a rotating set of nodes for seamless updates, complicating efforts to dismantle the operation. Linguistic artifacts within the code, like Russian language strings, hint at the malware’s geographic origin or intended target.

Experts suggest using behavior-based defense strategies, which do not rely solely on static signatures, to effectively detect and mitigate this evolving threat. Staying informed and adapting security measures are crucial steps in safeguarding against such advanced cyber attacks.

Cyber Security News Tags:AI-generated, command-and-control, cyber attack, Cybersecurity, data theft, GitHub, IT security, Malware, network security, OSINT, PyStoreRAT, Ransomware, Rhadamanthys stealer, supply chain attack

Post navigation

Previous Post: Hackers Target SolarWinds Vulnerability to Deploy Tools
Next Post: Telegram Users Targeted by Advanced Phishing Scheme

Related Posts

SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT Cyber Security News
IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands Cyber Security News
Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media Cyber Security News
Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles Cyber Security News
Microsoft Patch Tuesday August 2025 Released Microsoft Patch Tuesday August 2025 Released Cyber Security News
North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TeamPCP Exploits Cloud Vulnerabilities for Cybercrime
  • Vortex Werewolf Targets Russian Networks with Tor
  • New Insights on Optimizing KEV Catalog Usage for Security
  • Critical Security Flaw Patched in BeyondTrust Products
  • Detecting Ransomware with Windows Minifilter Technology

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TeamPCP Exploits Cloud Vulnerabilities for Cybercrime
  • Vortex Werewolf Targets Russian Networks with Tor
  • New Insights on Optimizing KEV Catalog Usage for Security
  • Critical Security Flaw Patched in BeyondTrust Products
  • Detecting Ransomware with Windows Minifilter Technology

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark