Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer

Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer

Posted on January 27, 2026January 27, 2026 By CWS

Cybercriminals have found a harmful method to trick builders into downloading malware by exploiting how GitHub works.

The assault includes creating faux variations of the GitHub Desktop installer and making them seem professional to unsuspecting customers.

Between September and October 2025, this marketing campaign primarily focused customers in Europe and the European Financial Space, although infections unfold to Japan and different areas.

The malware, disguised as a regular improvement device installer, represents a critical risk to builders who depend on GitHub for his or her each day work.

The assault chain begins when criminals create throwaway GitHub accounts and fork the official GitHub Desktop repository.

They then modify the obtain hyperlinks within the README file to level towards their malicious installer as a substitute of the professional one. Utilizing sponsored commercials focusing on searches for “GitHub Desktop,” attackers promote these contaminated information to builders.

An infection Chain (Supply – GMO Cybersecurity)

The criminals exploit a characteristic in GitHub’s design that enables commits from forked repositories to stay seen underneath the official repository’s namespace, even after the unique fork or account is deleted.

This method, known as repo squatting, makes it extraordinarily troublesome for GitHub to trace and take away malicious content material.

GMO Cybersecurity analysts recognized that this marketing campaign represents an adaptive, ongoing risk that continues evolving.

The malicious Home windows installer detected by the researchers, named GitHubDesktopSetup-x64.exe with a file measurement of 127.68 megabytes, serves as a multi-stage loader.

.NET software (Supply – GMO Safety)

Comparable malicious samples have been found disguised underneath different software names together with Chrome, Notion, 1Password, and Bitwarden installers courting again to Could 2025.

Analyzing the An infection Mechanism and Superior Evasion Ways

The an infection mechanism reveals subtle technical deception.

The malicious installer seems as a regular C++ software on the floor, however evaluation of its debug info reveals it’s truly a single-file .NET software bundled right into a single executable known as an AppHost.

OpenCL Shenanigans (Supply – GMO Safety)

The precise malicious .NET payload hides throughout the file’s overlay part, making it invisible to easy scanning instruments.

What makes this notably regarding is that the malware incorporates a GPU-based API known as OpenCL to intentionally forestall evaluation in commonplace sandbox environments.

HijackLoader (Supply – GMO Safety)

Most safety testing sandboxes and digital machines lack GPU drivers or OpenCL assist, forcing safety researchers to conduct evaluation on precise bodily machines with actual graphics {hardware} earlier than understanding the malware’s true habits.

This method, dubbed GPUGate, represents deliberate anti-analysis safety designed to decelerate safety researchers.

Moreover, the malware deliberately makes use of code misdirection ways to confuse analysts making an attempt to get better the decryption keys statically.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Desktop, Distribute, GitHub, Hijacking, Installer, Malware, Official, Repository

Post navigation

Previous Post: Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
Next Post: Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Related Posts

Managing Data Subject Access Requests in Compliance Programs Managing Data Subject Access Requests in Compliance Programs Cyber Security News
Hackers Exploit Microsoft 365 Mailbox Rules for Email Interception Hackers Exploit Microsoft 365 Mailbox Rules for Email Interception Cyber Security News
DarkCloud Malware Threatens Enterprises with Credential Theft DarkCloud Malware Threatens Enterprises with Credential Theft Cyber Security News
Ollama Flaw Threatens 300,000 Global Servers Ollama Flaw Threatens 300,000 Global Servers Cyber Security News
Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps Cyber Security News
1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks 1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark