Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer

Posted on January 27, 2026January 27, 2026 By CWS

Cybercriminals have found a harmful method to trick builders into downloading malware by exploiting how GitHub works.

The assault includes creating faux variations of the GitHub Desktop installer and making them seem professional to unsuspecting customers.

Between September and October 2025, this marketing campaign primarily focused customers in Europe and the European Financial Space, although infections unfold to Japan and different areas.

The malware, disguised as a regular improvement device installer, represents a critical risk to builders who depend on GitHub for his or her each day work.

The assault chain begins when criminals create throwaway GitHub accounts and fork the official GitHub Desktop repository.

They then modify the obtain hyperlinks within the README file to level towards their malicious installer as a substitute of the professional one. Utilizing sponsored commercials focusing on searches for “GitHub Desktop,” attackers promote these contaminated information to builders.

An infection Chain (Supply – GMO Cybersecurity)

The criminals exploit a characteristic in GitHub’s design that enables commits from forked repositories to stay seen underneath the official repository’s namespace, even after the unique fork or account is deleted.

This method, known as repo squatting, makes it extraordinarily troublesome for GitHub to trace and take away malicious content material.

GMO Cybersecurity analysts recognized that this marketing campaign represents an adaptive, ongoing risk that continues evolving.

The malicious Home windows installer detected by the researchers, named GitHubDesktopSetup-x64.exe with a file measurement of 127.68 megabytes, serves as a multi-stage loader.

.NET software (Supply – GMO Safety)

Comparable malicious samples have been found disguised underneath different software names together with Chrome, Notion, 1Password, and Bitwarden installers courting again to Could 2025.

Analyzing the An infection Mechanism and Superior Evasion Ways

The an infection mechanism reveals subtle technical deception.

The malicious installer seems as a regular C++ software on the floor, however evaluation of its debug info reveals it’s truly a single-file .NET software bundled right into a single executable known as an AppHost.

OpenCL Shenanigans (Supply – GMO Safety)

The precise malicious .NET payload hides throughout the file’s overlay part, making it invisible to easy scanning instruments.

What makes this notably regarding is that the malware incorporates a GPU-based API known as OpenCL to intentionally forestall evaluation in commonplace sandbox environments.

HijackLoader (Supply – GMO Safety)

Most safety testing sandboxes and digital machines lack GPU drivers or OpenCL assist, forcing safety researchers to conduct evaluation on precise bodily machines with actual graphics {hardware} earlier than understanding the malware’s true habits.

This method, dubbed GPUGate, represents deliberate anti-analysis safety designed to decelerate safety researchers.

Moreover, the malware deliberately makes use of code misdirection ways to confuse analysts making an attempt to get better the decryption keys statically.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Desktop, Distribute, GitHub, Hijacking, Installer, Malware, Official, Repository

Post navigation

Previous Post: Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions

Related Posts

Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image Cyber Security News
QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code Cyber Security News
Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials Cyber Security News
Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT Cyber Security News
SonicWall SSLVPN Under Attack Following the Breach of All Customers’ Firewall Backups Cyber Security News
Finland Arrests Two Cargo Ship Crew Members Over Undersea Cable Damage Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
  • Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
  • Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark