<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">

Hackers Use Fake GitHub Desktop Apps to Spread Malware Through Malicious Ads

Beware of fake GitHub Desktop downloads: a malvertising campaign installs malware by exploiting GitHub's reputation. Stay safe with our insights.
Content Team

Cybercriminals are running a sophisticated malvertising campaign that tricks users into downloading fake GitHub Desktop clients loaded with malware. The attackers exploit GitHub's trusted reputation by creating compromised repositories with hidden malicious code that appears legitimate.

When users search for GitHub Desktop through infected ads, they're redirected to these fake repositories. Once downloaded, the malware performs extensive system reconnaissance, collecting operating system details and network configurations before connecting to command servers.

The campaign uses advanced evasion techniques, including PowerShell payloads that deploy NetSupport Remote Access Trojan and AutoIT interpreters disguised as COM files. Unit 42 researchers discovered the threat through behavioral analysis of suspicious repository activities.

Source: Cybersecurity News

Share this article
Share on facebook Share on linkedin Share on twitter Share on email
blog_book_a_demo_cta_3x
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo