Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Posted on July 17, 2025July 17, 2025 By CWS

Jul 17, 2025Ravie LakshmananMalware / Social Engineering
Risk actors are leveraging public GitHub repositories to host malicious payloads and distribute them by way of Amadey as a part of a marketing campaign noticed in April 2025.
“The MaaS [malware-as-a-service] operators used pretend GitHub accounts to host payloads, instruments, and Amadey plug-ins, possible as an try to bypass internet filtering and for ease of use,” Cisco Talos researchers Chris Neal and Craig Jackson mentioned in a report printed immediately.
The cybersecurity firm mentioned the assault chains leverage a malware loader known as Emmenhtal (aka PEAKLIGHT) to ship Amadey, which, for its half, downloads numerous customized payloads from public GitHub repositories operated by the menace actors.
The exercise shares tactical similarities with an e mail phishing marketing campaign that used bill fee and billing-related lures to distribute SmokeLoader by way of Emmenhtal in February 2025 in assaults focusing on Ukrainian entities.
Each Emmenhtal and Amadey perform as a downloader for secondary payloads like data stealers, though the latter has additionally been noticed delivering ransomware like LockBit 3.0 previously.
One other essential distinction between the 2 malware households is that not like Emmenhtal, Amadey can gather system data and will be prolonged feature-wise with an array of DLL plugins that allow a selected performance, resembling credential theft or screenshot seize.

Cisco Talos’ evaluation of the April 2025 marketing campaign has uncovered three GitHub accounts (Legendary99999, DFfe9ewf, and Milidmdds) getting used to host Amadey plugins, secondary payloads, and different malicious assault scripts, together with Lumma Stealer, RedLine Stealer, and Rhadamanthys Stealer. The accounts have since been taken down by GitHub.
Among the JavaScript information current within the GitHub repositories have been discovered to be an identical to the Emmenthal scripts employed within the SmokeLoader marketing campaign, the first distinction being the payloads downloaded. Particularly, the Emmenhtal loader information within the repositories function a supply vector for Amadey, AsyncRAT, and a reputable copy of PuTTY.exe.
Additionally found within the GitHub repositories is a Python script that possible represents an evolution of Emmenhtal, incorporating an embedded PowerShell command to obtain Amadey from a hard-coded IP handle.

It is believed that the GitHub accounts used to stage the payloads are half of a bigger MaaS operation that abuses Microsoft’s code internet hosting platform for malicious functions.
The disclosure comes as Trellix detailed a phishing marketing campaign that propagates one other malware loader often called SquidLoader in cyber assaults directed in opposition to monetary providers establishments in Hong Kong. Extra artifacts unearthed by the safety vendor counsel associated assaults could also be underway in Singapore and Australia.
SquidLoader assault chain
SquidLoader is a formidable menace owing to the various array of anti-analysis, anti-sandbox, and anti-debug strategies packed into it, permitting it to evade detection and hinder investigation efforts. It may additionally set up communication with a distant server to ship details about the contaminated host and inject the next-stage payload.
“SquidLoader employs an assault chain culminating within the deployment of a Cobalt Strike beacon for distant entry and management,” safety researcher Charles Crofford mentioned. “Its intricate anti-analysis, anti-sandbox, and anti-debugging strategies, coupled with its sparse detection charges, pose a major menace to focused organizations.”
The findings additionally observe the invention of a variety of social engineering campaigns which might be engineered to distribute numerous malware households –

Assaults possible undertaken by a financially motivated group known as UNC5952 that leverage bill themes in emails to serve malicious droppers that result in the deployment of a downloader known as CHAINVERB that, in flip, delivers the ConnectWise ScreenConnect distant entry software program
Assaults that make use of tax-related decoys to trick recipients into clicking on a hyperlink that in the end delivers a ConnectWise ScreenConnect installer underneath the pretext of launching a PDF doc
Assaults that make use of U.S. Social Safety Administration (SSA) themes to reap person credentials or set up trojanized model of ConnectWise ScreenConnect, following which victims are instructed to put in and sync Microsoft’s Cellphone Hyperlink app to presumably gather textual content messages and two-factor authentication codes despatched to the related cell machine
Assaults that leverage a phishing package known as Logokit to allow credential harvesting by creating lookalike login pages and internet hosting them on Amazon Internet Companies (AWS) infrastructure to bypass detection, whereas concurrently integrating Cloudflare Turnstile CAPTCHA verification to create a false sense of safety and legitimacy
Assaults that make use of one other customized Python Flask-based phishing package to facilitate credential theft with minimal technical effort
Assaults codenamed Scanception that make use of QR codes in PDF e mail attachments to direct customers to credential harvesting pages mimicking the Microsoft login portal
Assaults that make use of the ClickFix tactic to ship Rhadamanthys Stealer and NetSupport RAT
Assaults that make the most of cloaking-as-a-service (CaaS) choices like Hoax Tech and JS Click on Cloaker to hide phishing and malicious web sites from safety scanners and present them solely to meant victims as a option to fly underneath the radar
Assaults that leverage HTML and JavaScript to craft malicious realistic-looking emails that may bypass person suspicion and conventional detection instruments
Assaults focusing on B2B service suppliers that make use of Scalable Vector Graphics (SVG) picture information in phishing emails and which embed obfuscated JavaScript to facilitate redirects to attacker-controlled infrastructure utilizing the window.location.href perform as soon as they’re opened in an internet browser

In accordance with information compiled by Cofense, using QR codes accounted for 57% of campaigns with superior Ways, Strategies, and Procedures (TTPs) in 2024. Different notable strategies embody using password-protected archive attachments in emails to get round safe e mail gateways (SEG).
“By password-protecting the archive, menace actors stop SEGs and different strategies from scanning its contents and detecting what is often a clearly malicious file,” Cofense researcher Max Gannon mentioned.

The Hacker News Tags:Amadey, Bypassing, Data, Filters, GitHub, Hackers, Host, Malware, Repositories, Stealers

Post navigation

Previous Post: H2Miner Attacking Linux, Windows, and Containers to Mine Monero
Next Post: Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets

Related Posts

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild The Hacker News
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks The Hacker News
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems The Hacker News
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI The Hacker News
Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency The Hacker News
XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News