Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Infostealer Uses GitHub for Covert Payload Distribution

Infostealer Uses GitHub for Covert Payload Distribution

Posted on May 8, 2026 By CWS

A recent cyberespionage operation has surfaced, employing a straightforward yet effective technique to bypass security systems. The campaign, known as “HumanitarianBait,” disguises its malware as a humanitarian aid request while the actual malicious payload is concealed on GitHub.

Phishing Tactics and Malware Distribution

The operation begins with a phishing email containing a RAR archive. Within this archive is a Windows shortcut file (LNK file) masquerading as a Russian-language humanitarian aid request form. Upon opening, the infection process stealthily initiates in the background, while the victim sees a seemingly authentic document, reducing suspicion.

Researchers from Cyble Research and Intelligence Labs have identified this campaign, noting the significant effort by the attackers to make their scheme appear routine. By utilizing GitHub, a platform deemed safe by most security tools, the attackers have cleverly hidden the malicious payload among normal developer traffic, complicating detection efforts.

GitHub Releases: A Strategic Choice

This malware uses a Python-based implant that operates without leaving a conventional executable file on the system. Once deployed, it functions as a full surveillance platform, silently collecting browser passwords, session cookies, keystrokes, clipboard data, screenshots, Telegram session information, and sensitive files.

The attackers have strategically chosen to host the payload in the GitHub Releases section of a well-maintained account. This area receives less automated scrutiny than typical repositories, allowing updates without visible commit histories. The account also hosts legitimate files, such as the Python runtime installer, making all downloads appear routine even to network monitoring tools.

Advanced Infection Techniques

The attack chain is meticulously crafted. Following the execution of the LNK file, PowerShell reads obfuscated content embedded at a specific offset and executes it directly in memory, an anti-sandbox technique that prevents execution if the original file is absent.

The malware then establishes a self-contained Python environment in the user’s AppData folder, avoiding the need for administrator access. It creates a directory named “WindowsHelper” to mimic a legitimate Windows component. VBScript launchers run the payload silently, while a Windows Scheduled Task ensures its continuous operation, even after reboot.

Mitigation and Precautionary Measures

To mitigate the risk of such threats, users should exercise caution with unexpected compressed files and shortcut attachments in emails. Regularly enabling file extensions in Windows, auditing scheduled tasks, and monitoring for scripting tools in user-space directories can help detect these threats early.

Indicators of compromise include various SHA-256 hashes and URLs used in the attack. Recognizing these signs can prevent significant data breaches.

Staying informed and vigilant is crucial in the ever-evolving landscape of cybersecurity threats. For further updates, follow us on Google News, LinkedIn, and X for more instant updates, and set CSN as a preferred source in Google.

Cyber Security News Tags:cyber attack, Cybersecurity, data theft, GitHub, InfoStealer, Malware, payload hosting, Phishing, Python malware, remote access

Post navigation

Previous Post: Online Age Verification Challenges Highlighted by Simple Tricks
Next Post: New Brazilian Malware Targets Financial Platforms

Related Posts

Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data Cyber Security News
Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code Cyber Security News
ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates Cyber Security News
Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Cyber Security News
13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center 13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center Cyber Security News
Top 3 SOC Bottlenecks and How to Solve Them   Top 3 SOC Bottlenecks and How to Solve Them   Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Brazilian Malware Targets Financial Platforms
  • Infostealer Uses GitHub for Covert Payload Distribution
  • Online Age Verification Challenges Highlighted by Simple Tricks
  • Fraudulent Android Apps Stole Millions via Fake Subscriptions
  • Malware Abuses AI Platforms Hugging Face and ClawHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Brazilian Malware Targets Financial Platforms
  • Infostealer Uses GitHub for Covert Payload Distribution
  • Online Age Verification Challenges Highlighted by Simple Tricks
  • Fraudulent Android Apps Stole Millions via Fake Subscriptions
  • Malware Abuses AI Platforms Hugging Face and ClawHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark