Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Abusing GitHub Notifications to Deliver Phishing Emails

Hackers Abusing GitHub Notifications to Deliver Phishing Emails

Posted on September 23, 2025September 23, 2025 By CWS

In current weeks, safety researchers have uncovered an elaborate phishing marketing campaign that leverages authentic GitHub notification mechanisms to ship malicious content material.

Victims obtain seemingly genuine repository alerts, full with real-looking commit messages and collaborator updates. Upon nearer inspection, the notification headers reveal altered sender addresses and obfuscated hyperlinks.

The marketing campaign’s sophistication has allowed it to slide previous many e-mail gateways, resulting in a surge in compromised credentials amongst builders and IT workers.

Preliminary reviews emerged when a number of open-source maintainers reported surprising password resets and unauthorized repository forks. H4x0r.DZ recognized the malware variant accountable for intercepting GitHub webhook notifications and appending phishing payloads.

Not like typical phishing emails, these messages preserve legitimate DKIM and SPF information by exploiting misconfigurations in third-party GitHub Apps.

Recipients clicking the embedded hyperlink are redirected via a series of URL shorteners earlier than touchdown on a credential-harvesting web page.

Evaluation of the phishing emails reveals that the malware injects customized HTML kinds into the GitHub notification template.

Notification kind (Supply – X)

The shape’s motion attribute factors to a URL underneath the attacker’s management, whereas JavaScript code captures the entered credentials and relays them by way of an AJAX POST request.

An infection Mechanism by way of Webhook Manipulation

The core an infection vector hinges on compromised GitHub Apps with overly broad webhook permissions.

Attackers first determine fashionable repositories that enable exterior Apps to subscribe to push occasions.

By registering a malicious App underneath a believable title, they acquire occasion subscriptions and purchase a webhook secret.

The attacker’s server validates incoming JSON payloads utilizing the key, then modifies the “pusher” area to insert malicious HTML earlier than forwarding the notification to GitHub’s e-mail service.

A simplified model of the injection logic seems under:-

perform modifyPayload(payload) {
let template = payload. Physique;
const phishingForm = “;
payload. Physique = template.exchange(‘

Cyber Security News Tags:Abusing, Deliver, Emails, GitHub, Hackers, Notifications, Phishing

Post navigation

Previous Post: GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
Next Post: Scattered Spider Suspect Arrested in US

Related Posts

Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack Cyber Security News
20 Best Inventory Management Tools in 2025 20 Best Inventory Management Tools in 2025 Cyber Security News
CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks Cyber Security News
Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges Cyber Security News
Everest Ransomware Group Allegedly Claims to Have Breached McDonald’s India Everest Ransomware Group Allegedly Claims to Have Breached McDonald’s India Cyber Security News
CISOs Guide to Navigating the 2025 Threat Landscape CISOs Guide to Navigating the 2025 Threat Landscape Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark