Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/Attackers Hijack Official GitHub Desktop, Dist Hijacking Repository
Threats

Attackers Hijack Official GitHub Desktop, Dist Hijacking Repository

Cybercriminals are now exploiting fundamental aspects of GitHub’s operations to trick developers into downloading malware. The attack involves creating fake versions of the GitHub Desktop...

Sarah simpson
Sarah simpson
January 27, 2026 3 Min Read
0 0

Cybercriminals are now exploiting fundamental aspects of GitHub’s operations to trick developers into downloading malware.

The attack involves creating fake versions of the GitHub Desktop installer and making them appear legitimate to unsuspecting users.

Between September and October 2025, this campaign primarily targeted users in Europe and the European Economic Area, though infections spread to Japan and other regions.

The malware, disguised as a standard development tool installer, represents a serious threat to developers who rely on GitHub for their daily work.

The attack chain begins when criminals create throwaway GitHub accounts and fork the official GitHub Desktop repository.

They then modify the download links in the README file to point toward their malicious installer instead of the legitimate one. Using sponsored advertisements targeting searches for “GitHub Desktop,” attackers promote these infected files to developers.

Infection Chain (Source - GMO Cybersecurity)
Infection Chain (Source – GMO Cybersecurity)

The criminals exploit a feature in GitHub’s design that allows commits from forked repositories to remain visible under the official repository’s namespace, even after the original fork or account is deleted.

This technique, called repo squatting, makes it extremely difficult for GitHub to track and remove malicious content.

GMO Cybersecurity analysts identified that this campaign represents an adaptive, ongoing threat that continues evolving.

The malicious Windows installer detected by the researchers, named GitHubDesktopSetup-x64.exe with a file size of 127.68 megabytes, serves as a multi-stage loader.

.NET application (Source - GMO Security)
.NET application (Source – GMO Security)

Similar malicious samples have been discovered disguised under other application names including Chrome, Notion, 1Password, and Bitwarden installers dating back to May 2025.

Analyzing the Infection Mechanism and Advanced Evasion Tactics

The infection mechanism reveals sophisticated technical deception.

The malicious installer appears as a standard C++ application on the surface, but analysis of its debug information reveals it is actually a single-file .NET application bundled into a single executable called an AppHost.

OpenCL Shenanigans (Source - GMO Security)
OpenCL Shenanigans (Source – GMO Security)

The actual malicious .NET payload hides within the file’s overlay section, making it invisible to simple scanning tools.

What makes this particularly concerning is that the malware incorporates a GPU-based API called OpenCL to deliberately prevent analysis in standard sandbox environments.

HijackLoader (Source - GMO Security)
HijackLoader (Source – GMO Security)

Most security testing sandboxes and virtual machines lack GPU drivers or OpenCL support, forcing security researchers to conduct analysis on actual physical machines with real graphics hardware before understanding the malware’s true behavior.

This technique, dubbed GPUGate, represents deliberate anti-analysis protection designed to slow down security researchers.

Additionally, the malware intentionally uses code misdirection tactics to confuse analysts attempting to recover the decryption keys statically.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityExploitMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Hackers Deliver Malicious Content via Teams, Posing as

Next Post

Critical VM2 Sandbox Flaw in Node.js Vulnerability Library

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us