Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer

Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer

Posted on January 27, 2026January 27, 2026 By CWS

Cybercriminals have found a harmful method to trick builders into downloading malware by exploiting how GitHub works.

The assault includes creating faux variations of the GitHub Desktop installer and making them seem professional to unsuspecting customers.

Between September and October 2025, this marketing campaign primarily focused customers in Europe and the European Financial Space, although infections unfold to Japan and different areas.

The malware, disguised as a regular improvement device installer, represents a critical risk to builders who depend on GitHub for his or her each day work.

The assault chain begins when criminals create throwaway GitHub accounts and fork the official GitHub Desktop repository.

They then modify the obtain hyperlinks within the README file to level towards their malicious installer as a substitute of the professional one. Utilizing sponsored commercials focusing on searches for “GitHub Desktop,” attackers promote these contaminated information to builders.

An infection Chain (Supply – GMO Cybersecurity)

The criminals exploit a characteristic in GitHub’s design that enables commits from forked repositories to stay seen underneath the official repository’s namespace, even after the unique fork or account is deleted.

This method, known as repo squatting, makes it extraordinarily troublesome for GitHub to trace and take away malicious content material.

GMO Cybersecurity analysts recognized that this marketing campaign represents an adaptive, ongoing risk that continues evolving.

The malicious Home windows installer detected by the researchers, named GitHubDesktopSetup-x64.exe with a file measurement of 127.68 megabytes, serves as a multi-stage loader.

.NET software (Supply – GMO Safety)

Comparable malicious samples have been found disguised underneath different software names together with Chrome, Notion, 1Password, and Bitwarden installers courting again to Could 2025.

Analyzing the An infection Mechanism and Superior Evasion Ways

The an infection mechanism reveals subtle technical deception.

The malicious installer seems as a regular C++ software on the floor, however evaluation of its debug info reveals it’s truly a single-file .NET software bundled right into a single executable known as an AppHost.

OpenCL Shenanigans (Supply – GMO Safety)

The precise malicious .NET payload hides throughout the file’s overlay part, making it invisible to easy scanning instruments.

What makes this notably regarding is that the malware incorporates a GPU-based API known as OpenCL to intentionally forestall evaluation in commonplace sandbox environments.

HijackLoader (Supply – GMO Safety)

Most safety testing sandboxes and digital machines lack GPU drivers or OpenCL assist, forcing safety researchers to conduct evaluation on precise bodily machines with actual graphics {hardware} earlier than understanding the malware’s true habits.

This method, dubbed GPUGate, represents deliberate anti-analysis safety designed to decelerate safety researchers.

Moreover, the malware deliberately makes use of code misdirection ways to confuse analysts making an attempt to get better the decryption keys statically.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Desktop, Distribute, GitHub, Hijacking, Installer, Malware, Official, Repository

Post navigation

Previous Post: Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
Next Post: Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Related Posts

Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Cyber Security News
Top 10 Best End-to-End Threat Intelligence Compaines in 2025 Top 10 Best End-to-End Threat Intelligence Compaines in 2025 Cyber Security News
CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure Cyber Security News
OpenClaw v2026.2.6 Enhances Security and Model Support OpenClaw v2026.2.6 Enhances Security and Model Support Cyber Security News
Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used Cyber Security News
Akira Ransomware Targets Over 250 Organizations, Extracts  Million in Ransom Payments – New CISA Report Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News