Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins

Posted on July 18, 2025July 18, 2025 By CWS

A complicated Malware-as-a-Service operation has emerged that exploits the trusted GitHub platform to distribute malicious payloads, representing a big evolution in cybercriminal ways.

The operation leverages faux GitHub accounts to host an arsenal of malware instruments, plugins, and payloads, capitalizing on GitHub’s widespread company acceptance to bypass conventional net filtering mechanisms.

The malicious marketing campaign targets Ukrainian entities by rigorously crafted phishing emails containing compressed archive attachments.

These archives conceal JavaScript recordsdata that make use of a number of layers of obfuscation to disguise PowerShell downloaders, finally delivering the Amadey malware and its related tooling.

First layer of obfuscation (Supply – Cisco Talos)

The operation’s infrastructure demonstrates exceptional sophistication, using public GitHub repositories as open directories for staging customized payloads throughout a number of malware households.

The assault initially gained consideration by its connection to a separate SmokeLoader phishing marketing campaign that additionally focused Ukrainian organizations.

Nevertheless, Cisco Talos analysts recognized the broader scope of the operation in April 2025, revealing its true nature as a complete MaaS platform.

The researchers found that the identical Emmenhtal loader variant used within the SmokeLoader marketing campaign was being repurposed to ship Amadey payloads and different malicious instruments.

What makes this operation significantly regarding is its abuse of GitHub’s official infrastructure.

Legendary99999 GitHub account overview (Supply – Cisco Talos)

The menace actors created three major accounts—Legendary99999, DFfe9ewf, and Milidmdds—every serving distinct functions inside the malware distribution community.

Milidmdds GitHub account overview (Supply – Cisco Talos)

Essentially the most lively account, Legendary99999, contained over 160 repositories with randomized names, every internet hosting a single malicious file within the “Releases” part.

Superior An infection Mechanism and Multi-Stage Payload Supply

The Emmenhtal loader serves as the first an infection vector, using a complicated four-layer obfuscation scheme that demonstrates superior evasion capabilities.

The primary layer defines a sequence of two-letter variables mapped to numeric values, that are utilized to a protracted string of comma-separated values saved in a randomly named variable similar to “qiXSF.”

This preliminary obfuscation layer successfully conceals the malicious code from primary static evaluation instruments.

The second layer makes use of the ActiveXObject perform to execute an encoded PowerShell command by WScript.Shell, whereas the third layer incorporates a PowerShell command with an AES-encrypted binary blob.

The ultimate layer decrypts and executes a further AES-encrypted PowerShell script that initiates the obtain of the next-stage payload from hardcoded IP addresses, together with 185.215.113.16 and 185.215.113.43.

This multi-stage method permits the malware to ship numerous payloads together with info stealers like Rhadamanthys, Lumma, and Redline, in addition to distant entry trojans similar to AsyncRAT.

The operation’s adaptability is additional demonstrated by its means to ship official instruments like PuTTY.exe alongside malicious payloads, showcasing the MaaS mannequin’s flexibility in assembly varied consumer necessities.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Accounts, Actors, Amadey, GitHub, Host, Malware, Payloads, PlugIns, Threat, Tools, Weaponizing

Post navigation

Previous Post: Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors
Next Post: Email Protection Startup StrongestLayer Emerges From Stealth Mode

Related Posts

APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads Cyber Security News
McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News
China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure Cyber Security News
Mastering Intrusion Detection Systems – A Technical Guide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Prevent Social Engineering Attacks
  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Prevent Social Engineering Attacks
  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News