Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Abusing GitHub Notifications to Deliver Phishing Emails

Posted on September 23, 2025September 23, 2025 By CWS

In current weeks, safety researchers have uncovered an elaborate phishing marketing campaign that leverages authentic GitHub notification mechanisms to ship malicious content material.

Victims obtain seemingly genuine repository alerts, full with real-looking commit messages and collaborator updates. Upon nearer inspection, the notification headers reveal altered sender addresses and obfuscated hyperlinks.

The marketing campaign’s sophistication has allowed it to slide previous many e-mail gateways, resulting in a surge in compromised credentials amongst builders and IT workers.

Preliminary reviews emerged when a number of open-source maintainers reported surprising password resets and unauthorized repository forks. H4x0r.DZ recognized the malware variant accountable for intercepting GitHub webhook notifications and appending phishing payloads.

Not like typical phishing emails, these messages preserve legitimate DKIM and SPF information by exploiting misconfigurations in third-party GitHub Apps.

Recipients clicking the embedded hyperlink are redirected via a series of URL shorteners earlier than touchdown on a credential-harvesting web page.

Evaluation of the phishing emails reveals that the malware injects customized HTML kinds into the GitHub notification template.

Notification kind (Supply – X)

The shape’s motion attribute factors to a URL underneath the attacker’s management, whereas JavaScript code captures the entered credentials and relays them by way of an AJAX POST request.

An infection Mechanism by way of Webhook Manipulation

The core an infection vector hinges on compromised GitHub Apps with overly broad webhook permissions.

Attackers first determine fashionable repositories that enable exterior Apps to subscribe to push occasions.

By registering a malicious App underneath a believable title, they acquire occasion subscriptions and purchase a webhook secret.

The attacker’s server validates incoming JSON payloads utilizing the key, then modifies the “pusher” area to insert malicious HTML earlier than forwarding the notification to GitHub’s e-mail service.

A simplified model of the injection logic seems under:-

perform modifyPayload(payload) {
let template = payload. Physique;
const phishingForm = “;
payload. Physique = template.exchange(‘

Cyber Security News Tags:Abusing, Deliver, Emails, GitHub, Hackers, Notifications, Phishing

Post navigation

Previous Post: GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
Next Post: Scattered Spider Suspect Arrested in US

Related Posts

Rockwell Arena Simulation Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram Cyber Security News
X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption Cyber Security News
Conducting Risk Assessments That Drive Business Value Cyber Security News
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News
ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain
  • SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw
  • Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 
  • All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher
  • Why CISOs Must Rethink Incident Remediation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain
  • SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw
  • Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 
  • All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher
  • Why CISOs Must Rethink Incident Remediation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News