By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Github is vital for millions of users. That is why it has become the perfect place to hide malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > Github is vital for millions of users. That is why it has become the perfect place to hide malware
Mobile

Github is vital for millions of users. That is why it has become the perfect place to hide malware

News Room
Last updated: 2025/07/18 at 10:30 PM
News Room Published 18 July 2025
Share
SHARE

When a tool is so useful that no one dares to block it, it becomes a magnet for attackers. That is what is happening with Girub: public repositories, camouflaged archives and malicious loads that go unnoticed in corporate environments. Cisco Talos has uncovered a campaign that demonstrates it.

The campaign, active since February 2025, was not an isolated experiment. It was a well structured operation based on the malware-as-a-service model (MaaS), in which attack tools are sold as if they were cloud services. In this case, the operators used Github to distribute malware through seemingly harmless links.

When the malicious code hides in full view

“In many environments, a malicious download from Github may seem normal traffic”, Explain the talos researchers. And there is the problem: the actors behind this campaign knew how to move between the legitimate and the harmful without raising suspicions, using the Microsoft platform owned by Microsoft as an undercover distribution channel.

The process began with Emmenhtal, a Loader designed to act by layers. Three of them were exclusively responsible for hiding the code. Only at the end of the process a script was executed in Powershell that contacted a remote address to download the real payload.

That payload was Amadey, a malware known since 2018 in Russian speech forums. Its main function is to collect information from the infected system and Download additional files depending on the profile of the equipment. The most striking thing is that these files did not

One of the most active accounts was legendary99999. In it, more than 160 repositories with random names were detected, each hosting a single malicious file in its release section. From there, the attackers could send direct links to the victims, as if it were any other legitimate download.

Gh3 Github Malware

Legendary 99999999999999 Settle

Legendary9999 was not an isolated case. Talos identified other accounts, such as Milidmdds or DFFE9EWF, which followed a similar pattern: random names, repositories with harmless appearance, but designed to execute malicious loads. In total, malware samples such as Rhadamanthys, Lumma, Redline or even legitimate tools such as Putty and Selenium Webdriver were detected.

The operation was always the same: once the equipment was infected, Amadey downloaded the necessary file from Github, according to the needs of each operator. The most striking is the flexibility of the operation: from remote access Trojans such as Asyncrat, to scripts disguised as MP4 files or even python code with hidden functions.

When you ask an AI the company of a company, it is most likely to be mistaken. Good news for phishing

Github acted quickly. As soon as Talos notified the findings, LThe accounts were eliminated. But the problem does not seem to be the platform yes, but the strategy behind its use: take advantage of legitimate and necessary services to hide malicious activities.

Images | WorldOfSoftware with Gemini 2.5 Flash | Talos

In WorldOfSoftware | The “Son in Hurry” scam had been wreaking havoc throughout Spain for years. Police are finally dismantling it

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Google Pixel Watch 3 is back down to its Prime Day price
Next Article The 5 Best Weekend Tech Deals on Desktops, Headphones, TVs, and More
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

watchOS 26: 10 New Things Your Apple Watch Can Do
News
NOBS Toothpaste Tablets: What Dentists Say About Its Main Ingredient
News
Wayland Color Management For HDR Under Review For Chrome/Chromium
Computing
Ham Radio Users Clash With Starlink Rival AST SpaceMobile Over Spectrum Use
News

You Might also Like

Mobile

The countries with the greatest oil reserves, exposed in this graphic with a sad protagonist: Venezuela

5 Min Read
Mobile

More and more video games are using generative AI, for better and for worse

5 Min Read
Mobile

Check Expected Specs, Features, Price

3 Min Read
Mobile

Apple carplay ultra handling in an Aston Martin DBX707

14 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?