Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Massive Cyberattack Targets Trusted Platforms with Malware

Massive Cyberattack Targets Trusted Platforms with Malware

Posted on February 11, 2026 By CWS

A sophisticated cyberattack has recently emerged, affecting users across various operating systems by exploiting trusted mirror websites and GitHub repositories. This extensive supply chain attack, known as RU-APT-ChainReaver-L, targets Windows, macOS, and iOS platforms simultaneously, making it one of the most complex threats identified to date.

Advanced Techniques and Compromised Infrastructure

The attackers employ intricate methods such as code signing with legitimate certificates, misleading redirect chains, and malware dissemination via reputable cloud services, complicating detection efforts by standard security systems. The campaign’s infrastructure is notably large and intricate, with attackers compromising two prominent file-sharing mirror services: Mirrored.to and Mirrorace.org, which are extensively used by software download sites worldwide.

By embedding malicious code into these platforms, the threat actors have effectively turned trusted infrastructures into vectors for deploying infostealer malware. Users attempting to download files through these compromised services are redirected through numerous intermediary pages, designed to evade security measures while maintaining an appearance of legitimacy.

Detection and Analysis by GRAPH Researchers

GRAPH analysts uncovered this campaign while examining a surge in user credentials on dark web marketplaces. Their investigation traced these stolen accounts to a coordinated infection operation that had been active for several months. Using their Extended Detection and Response platform and threat hunting operations, GRAPH researchers exposed an attack infrastructure encompassing over 100 domains, including command-and-control servers and redirection intermediaries.

The campaign’s operators constantly update their tools and infrastructure, frequently altering malware signatures and delivery methods to evade antivirus detection. The attack methodology varies based on the victim’s operating system, with Windows users redirected to cloud storage services like MediaFire and Dropbox, where password-protected archives contain signed malware. macOS users encounter ClickFix attacks involving deceptive pages that prompt manual execution of terminal commands to download and install MacSync Stealer malware. iOS users are misled into downloading fraudulent VPN applications from the Apple App Store, which then launch phishing attacks against their devices.

Exploitation of GitHub and Malware Impact

The campaign’s exploitation of GitHub highlights a sophisticated understanding of security team vulnerabilities. GRAPH researchers observed that attackers compromised 50 GitHub accounts, many established years ago, to host malicious repositories. These accounts, primarily hijacked in November 2025, were repurposed to distribute cracked software and activation tools, especially targeting users seeking pirated software.

The Windows malware acts as an infostealer, capturing screenshots, extracting cryptocurrency wallet data, messenger databases, browser credentials, and copying files from Desktop, Documents, and Downloads folders. GRAPH analysts reported that samples include valid code signing certificates from multiple companies, significantly hindering detection efforts.

Mitigation Strategies and Future Outlook

Organizations should adopt comprehensive defense strategies, with user education as a critical layer, since infections heavily rely on social engineering. Security teams must implement multi-layered endpoint protection, including EDR systems capable of detecting unusual process behaviors and suspicious file access patterns. Network monitoring should focus on connections to file-sharing services and newly registered domains.

Restricting direct internet access for user systems and routing downloads through file analysis platforms using static and dynamic analysis and machine learning is essential. As the cyber threat landscape continues to evolve, staying informed and vigilant is crucial for safeguarding against such sophisticated attacks.

Cyber Security News Tags:cloud services, Cybersecurity, GitHub, InfoStealer, IOS, macOS, Malware, network security, supply chain attack, Windows

Post navigation

Previous Post: Rising Cyber Threats Challenge Defense Sector Security
Next Post: VoidLink Framework Enables Dynamic Linux Tool Deployment

Related Posts

Instagram Data Leak Exposes Sensitive Info of 17.5M Accounts Instagram Data Leak Exposes Sensitive Info of 17.5M Accounts Cyber Security News
Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation Cyber Security News
Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update Cyber Security News
YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware Cyber Security News
Volkswagen Allegedly Hit by Ransomware Attack as 8Base Claims Sensitive Data Theft Volkswagen Allegedly Hit by Ransomware Attack as 8Base Claims Sensitive Data Theft Cyber Security News
Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VoidLink Framework Enables Dynamic Linux Tool Deployment
  • Massive Cyberattack Targets Trusted Platforms with Malware
  • Rising Cyber Threats Challenge Defense Sector Security
  • Nevada Introduces New Data Classification Policy
  • New Ransomware Threats BQTLock and GREENBLOOD Emerge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VoidLink Framework Enables Dynamic Linux Tool Deployment
  • Massive Cyberattack Targets Trusted Platforms with Malware
  • Rising Cyber Threats Challenge Defense Sector Security
  • Nevada Introduces New Data Classification Policy
  • New Ransomware Threats BQTLock and GREENBLOOD Emerge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark