Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User

Posted on June 6, 2025June 7, 2025 By CWS

A complicated malware distribution marketing campaign has weaponized over 140 GitHub repositories to focus on inexperienced cybercriminals and gaming cheat customers, representing one of many largest documented circumstances of provide chain assaults on the platform.

The repositories, masquerading as legit malware instruments and sport cheats, include elaborate backdoors designed to contaminate customers who compile the seemingly genuine code.

The marketing campaign facilities round repositories linked to the e-mail handle [email protected], with the oldest malicious commits relationship again to November 2023.

One of many malicious repositories (Supply – Sophos)

Of the 141 found repositories, 133 contained backdoors using 4 distinct an infection strategies, with the bulk claiming to supply gaming cheats (58%) whereas others purport to be malware initiatives, exploits, or assault instruments (24%).

The remaining repositories concentrate on cryptocurrency instruments, bot-related initiatives, and miscellaneous utilities.

Sophos analysts recognized the marketing campaign after receiving a buyer inquiry about “Sakura RAT,” an open-source malware undertaking that originally appeared to own subtle anti-detection capabilities.

A publish on a cybercrime discussion board asking for assist with Sakura RAT (Supply – Sophos)

Upon investigation, researchers found that whereas the RAT itself was non-functional resulting from empty kinds and copied code from AsyncRAT, it contained malicious PreBuild occasions designed to silently obtain malware onto customers’ units throughout compilation.

The scope and class of this operation suggests a coordinated effort probably linked to Distribution-as-a-Service operations beforehand reported in 2024-2025, although proof signifies the marketing campaign might have existed in varied kinds since 2022.

The risk actor employs a number of deception methods, together with automated GitHub Actions workflows that create the phantasm of lively improvement by frequent commits, with some repositories accumulating practically 60,000 commits regardless of being created solely months earlier.

The PreBuild Backdoor: A Multi-Stage An infection Chain

Probably the most prevalent backdoor variant, present in 111 repositories, exploits Visible Studio’s PreBuild occasion performance to execute malicious instructions earlier than undertaking compilation.

The assault begins when builders try to construct seemingly legit Visible Fundamental initiatives, triggering a fancy four-stage an infection course of hidden throughout the undertaking’s .vbproj file.

The preliminary stage entails a closely obfuscated batch command embedded within the PreBuild occasion area. This command creates a VBS script within the consumer’s short-term listing containing three Base64-encoded strings.

The script then concatenates these strings, decodes them, and writes the outcome to a PowerShell script earlier than executing it with bypassed execution insurance policies.

The PowerShell payload implements a complicated decoding mechanism utilizing a hardcoded key saved within the $prooc variable: “UtCkt-h6=my1_zt”.

This script constantly loops by 4 features that decode hardcoded URLs, fetch extra encoded content material, and in the end obtain a 7zip archive from GitHub.

The malware checks for current 7zip installations and downloads the software if vital earlier than extracting and executing a file referred to as SearchFilter.exe.

The preliminary backdoor (Supply – Sophos)

The preliminary backdoor construction, exhibiting how the risk actor makes use of HTML encoding and string obfuscation to disguise malicious batch instructions.

The ultimate payload, delivered as an enormous Electron software, incorporates over 17,000 strains of closely obfuscated JavaScript code designed to disable Home windows Defender, delete shadow copies, and deploy a number of info stealers together with AsyncRAT, Remcos, and Lumma Stealer.

The marketing campaign’s persistence mechanisms embody creating scheduled duties with names mimicking legit Microsoft companies and manipulating registry entries to exclude frequent evaluation instruments from antivirus scanning.

The malware additionally establishes communication with risk actors by hardcoded Telegram bot tokens, mechanically notifying operators of profitable infections with primary system info together with usernames, hostnames, and community configurations.

Velocity up and enrich risk investigations with Menace Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Cybercriminals, GitHub, Hundreds, Linked, Malware, Novice, Repos, Single, Targeting, User

Post navigation

Previous Post: How to Avoid QR Code Scams
Next Post: Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts

Related Posts

VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News
Cloud Misconfigurations The Silent Threat to Data Security Cyber Security News
Guide to Cloud API Security Cyber Security News
Ivanti Cloud Services Application Vulnerability Leads to Privilege Escalation Cyber Security News
Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News