Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New PyStoreRAT Malware Targets IT and OSINT Experts

New PyStoreRAT Malware Targets IT and OSINT Experts

Posted on February 9, 2026 By CWS

A new and sophisticated cyber threat is making waves by targeting Information Technology (IT) administrators and Open Source Intelligence (OSINT) professionals. This attack utilizes trusted platforms like GitHub to disseminate a covert backdoor known as PyStoreRAT. Unlike traditional attacks, this operation is meticulously planned, using dormant accounts to distribute malicious software without raising alarms.

Exploiting GitHub’s Reputation

The attackers reactivated long-dormant GitHub accounts, likely to capitalize on their established credibility. These accounts began releasing polished, AI-generated software projects. Often masquerading as helpful tools, such as cryptocurrency bots and security utilities, these repositories quickly gained attention. The use of AI-generated content allows the attackers to fill these repositories with seemingly legitimate code, making them more convincing to potential victims.

Identification and Impact

Security researchers from Morphisec discovered this campaign when they noticed several of these repositories climbing GitHub’s trending lists. This increased visibility placed the malicious tools in front of their target audience. As these repositories gained trust in the community, the attackers introduced subtle updates containing the previously unknown PyStoreRAT backdoor. This malware is engineered for long-term persistence and data theft, with capabilities to profile systems and deploy additional payloads, such as the Rhadamanthys stealer, which can exfiltrate sensitive data.

Adaptive Evasion Techniques

One of PyStoreRAT’s standout features is its adaptability to different security environments. The malware checks for specific antivirus products, such as CrowdStrike Falcon and ReasonLabs. Upon detection, it modifies its execution methods to bypass these defenses. Additionally, the command-and-control (C2) infrastructure supporting this campaign is designed for resilience. It employs a rotating set of nodes for seamless updates, complicating efforts to dismantle the operation. Linguistic artifacts within the code, like Russian language strings, hint at the malware’s geographic origin or intended target.

Experts suggest using behavior-based defense strategies, which do not rely solely on static signatures, to effectively detect and mitigate this evolving threat. Staying informed and adapting security measures are crucial steps in safeguarding against such advanced cyber attacks.

Cyber Security News Tags:AI-generated, command-and-control, cyber attack, Cybersecurity, data theft, GitHub, IT security, Malware, network security, OSINT, PyStoreRAT, Ransomware, Rhadamanthys stealer, supply chain attack

Post navigation

Previous Post: Hackers Target SolarWinds Vulnerability to Deploy Tools
Next Post: Telegram Users Targeted by Advanced Phishing Scheme

Related Posts

Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Cyber Security News
North Korean Hackers use Code Abuse Tactics for ‘Contagious Interview’ Campaign North Korean Hackers use Code Abuse Tactics for ‘Contagious Interview’ Campaign Cyber Security News
Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Cyber Security News
SentinelOne Global Service Outage Root Cause Revealed SentinelOne Global Service Outage Root Cause Revealed Cyber Security News
Scripted Sparrow Uses Automation to Generate and Send their Attack Messages Scripted Sparrow Uses Automation to Generate and Send their Attack Messages Cyber Security News
PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Detecting Ransomware with Windows Minifilter Technology
  • European Commission Probes Cyberattack on IT Systems
  • Telegram Users Targeted by Advanced Phishing Scheme
  • New PyStoreRAT Malware Targets IT and OSINT Experts
  • Hackers Target SolarWinds Vulnerability to Deploy Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Detecting Ransomware with Windows Minifilter Technology
  • European Commission Probes Cyberattack on IT Systems
  • Telegram Users Targeted by Advanced Phishing Scheme
  • New PyStoreRAT Malware Targets IT and OSINT Experts
  • Hackers Target SolarWinds Vulnerability to Deploy Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark