Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
BoryptGrab Malware Targets Users via Fake GitHub Projects

BoryptGrab Malware Targets Users via Fake GitHub Projects

Posted on March 9, 2026 By CWS

A newly identified malware known as BoryptGrab is rapidly spreading across Windows platforms. It utilizes fake GitHub repositories to deceive users into downloading what seem to be popular free software tools.

How BoryptGrab Operates

The campaign, active since April 2025, cleverly manipulates search engines to present these malicious repositories as legitimate, leading users into an intricate infection chain. This process ultimately results in the theft of sensitive information, which is covertly sent to the attackers.

A significant number of GitHub repositories have been established by the threat actors, each posing as a download page for various tools, including game cheats and productivity applications. These repositories use SEO-optimized keywords to rank highly in search results, appearing alongside authentic results.

Uncovering the Infection Chain

Upon clicking download links in these repositories, users undergo multiple redirections, involving base64-encoded and AES-encrypted URLs, before landing on a deceptive download page that distributes a malicious ZIP file. Trend Micro analysts traced the BoryptGrab campaign while investigating suspicious ZIP files, linking the infection chain back to these GitHub-hosted pages.

The research revealed a complex operation involving various payload variants, tagged with build names like “Shrek” and “CryptoByte.” This indicates a well-organized and ongoing threat. BoryptGrab is capable of extracting credentials and cookies from popular browsers like Chrome and Firefox, and targets over 30 cryptocurrency wallet applications, including Exodus and Ledger Live.

Potential Threats and Precautions

A notable aspect of this campaign is the inclusion of TunnesshClient, a backdoor that establishes a reverse SSH tunnel to the attacker’s server, allowing remote command execution and file transfer. Russian-language comments in the code and IP addresses linked to Russia suggest the origin of the attackers.

The infection starts when a victim downloads a ZIP file from these fake GitHub pages, leading to a page that redirects and serves a malicious ZIP file based on the victim’s visit. The payload within the ZIP can take various forms, including executables that decrypt embedded payloads or VBS scripts that use obfuscated PowerShell commands.

To minimize risk, users should download software only from verified sources and avoid free tools from unfamiliar GitHub repositories. Security teams should monitor for suspicious activities such as unexpected scheduled tasks and unusual outbound traffic. Keeping security tools up-to-date and verifying software sources are vital steps in reducing exposure to such threats.

Stay updated with the latest cybersecurity news by following us on Google News, LinkedIn, and X. Set CSN as your go-to source on Google for instant updates.

Cyber Security News Tags:BoryptGrab, browser security, crypto wallets, Cybersecurity, data protection, data theft, GitHub, Malware, Russian hackers, Trend Micro

Post navigation

Previous Post: Fake CleanMyMac Site Targets Users with SHub Stealer
Next Post: VIP Keylogger Campaign Threatens Cybersecurity

Related Posts

Critical Flaw in API Keys Plugin Enables Account Takeovers Critical Flaw in API Keys Plugin Enables Account Takeovers Cyber Security News
Threat Actors Attacking Organizations Key Employees With Weaponized Copyright Documents to Deliver Noodlophile Stealer Threat Actors Attacking Organizations Key Employees With Weaponized Copyright Documents to Deliver Noodlophile Stealer Cyber Security News
xRAT Malware Attacking Windows Users Disguised as Adult Game xRAT Malware Attacking Windows Users Disguised as Adult Game Cyber Security News
SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar Cyber Security News
Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools Cyber Security News
OpenAI Hardened ChatGPT Atlas Against Prompt Injection Attacks OpenAI Hardened ChatGPT Atlas Against Prompt Injection Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VIP Keylogger Campaign Threatens Cybersecurity
  • BoryptGrab Malware Targets Users via Fake GitHub Projects
  • Fake CleanMyMac Site Targets Users with SHub Stealer
  • Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions
  • M365Pwned Toolkit Enhances Microsoft 365 Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VIP Keylogger Campaign Threatens Cybersecurity
  • BoryptGrab Malware Targets Users via Fake GitHub Projects
  • Fake CleanMyMac Site Targets Users with SHub Stealer
  • Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions
  • M365Pwned Toolkit Enhances Microsoft 365 Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News