Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Abusing GitHub Notifications to Deliver Phishing Emails

Hackers Abusing GitHub Notifications to Deliver Phishing Emails

Posted on September 23, 2025September 23, 2025 By CWS

In current weeks, safety researchers have uncovered an elaborate phishing marketing campaign that leverages authentic GitHub notification mechanisms to ship malicious content material.

Victims obtain seemingly genuine repository alerts, full with real-looking commit messages and collaborator updates. Upon nearer inspection, the notification headers reveal altered sender addresses and obfuscated hyperlinks.

The marketing campaign’s sophistication has allowed it to slide previous many e-mail gateways, resulting in a surge in compromised credentials amongst builders and IT workers.

Preliminary reviews emerged when a number of open-source maintainers reported surprising password resets and unauthorized repository forks. H4x0r.DZ recognized the malware variant accountable for intercepting GitHub webhook notifications and appending phishing payloads.

Not like typical phishing emails, these messages preserve legitimate DKIM and SPF information by exploiting misconfigurations in third-party GitHub Apps.

Recipients clicking the embedded hyperlink are redirected via a series of URL shorteners earlier than touchdown on a credential-harvesting web page.

Evaluation of the phishing emails reveals that the malware injects customized HTML kinds into the GitHub notification template.

Notification kind (Supply – X)

The shape’s motion attribute factors to a URL underneath the attacker’s management, whereas JavaScript code captures the entered credentials and relays them by way of an AJAX POST request.

An infection Mechanism by way of Webhook Manipulation

The core an infection vector hinges on compromised GitHub Apps with overly broad webhook permissions.

Attackers first determine fashionable repositories that enable exterior Apps to subscribe to push occasions.

By registering a malicious App underneath a believable title, they acquire occasion subscriptions and purchase a webhook secret.

The attacker’s server validates incoming JSON payloads utilizing the key, then modifies the “pusher” area to insert malicious HTML earlier than forwarding the notification to GitHub’s e-mail service.

A simplified model of the injection logic seems under:-

perform modifyPayload(payload) {
let template = payload. Physique;
const phishingForm = “;
payload. Physique = template.exchange(‘

Cyber Security News Tags:Abusing, Deliver, Emails, GitHub, Hackers, Notifications, Phishing

Post navigation

Previous Post: GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
Next Post: Scattered Spider Suspect Arrested in US

Related Posts

Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution Cyber Security News
How SOCs Detect More Threats without Alert Overload How SOCs Detect More Threats without Alert Overload Cyber Security News
LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code Cyber Security News
Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
Deep Dive into Endpoint Security Deep Dive into Endpoint Security Cyber Security News
Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News