Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ZiChatBot Malware Uses Zulip APIs for Command & REST Control
May 8, 2026
Hackers Use Hugging Face & ClawHub to Deploy Malware
May 8, 2026
Fake Moustache Bypasses Age Verification, Raises Online Safety
May 8, 2026
Home/Threats/Infostealer Uses GitHub Releases for Payload Hosting & Evasion
Threats

Infostealer Uses GitHub Releases for Payload Hosting & Evasion

A recently uncovered cyberespionage campaign employs a deceptively simple yet effective tactic. Threat actors disguise malware as a humanitarian aid request while actively hiding the actual payload...

David kimber
David kimber
May 8, 2026 4 Min Read
1 0

A recently uncovered cyberespionage campaign employs a deceptively simple yet effective tactic. Threat actors disguise malware as a humanitarian aid request while actively hiding the actual payload on GitHub, allowing them to bypass traditional security defenses.

Researchers have named this operation “HumanitarianBait,” and it is far more capable than its plain-looking lure suggests.

The campaign starts with a phishing email carrying a RAR archive. Inside the archive is a Windows shortcut file, known as an LNK file, that pretends to be a form for requesting Russian-language humanitarian aid.

Once the victim opens it, the infection process begins quietly in the background, while a convincing-looking document is shown on screen to keep suspicion low.

Analysts from Cyble Research and Intelligence Labs identified the campaign and noted that the threat actor behind it has put considerable effort into making the attack feel routine.

The attacker chose GitHub, a platform that most security tools consider safe, to store and deliver the malicious payload. This choice allows harmful downloads to blend in with normal developer traffic, making detection much harder.

GitHub Releases as a Payload Hosting Strategy

The malware deploys a Python-based implant that works without leaving a traditional executable file on the system. Once installed, it runs silently in the background as a full surveillance platform, harvesting browser passwords, session cookies, keystrokes, clipboard contents, screenshots, Telegram session data, and sensitive files from the victim’s machine.

Infection chain (Source - Cyble)
Infection chain (Source – Cyble)

Attribution for this campaign remains inconclusive, though the Russian-language lures and humanitarian aid theme strongly suggest the intended targets are Russian-speaking individuals.

One of the most deliberate choices in this campaign is where the attacker stores the malicious payload. Instead of placing it directly in a GitHub repository, where automated scanners frequently look, the attacker uploaded it to the GitHub Releases section of a carefully maintained account. Release artifacts receive far less automated scrutiny, and updates can be pushed without leaving a visible commit history.

The same GitHub account also hosts completely clean, legitimate files, including the Python runtime installer and a standard pip setup file. This creates a situation where all downloads from the account look like normal developer activity, even to network monitoring tools watching for suspicious traffic.

Persistence through Windows Task Schedular (Source - Cyble)
Persistence through Windows Task Schedular (Source – Cyble)

The payload file, data.zip, was found to have been republished repeatedly with changing hash values, confirming the attacker is actively updating the campaign. The payload itself is protected with PyArmor v9.2 Pro, a commercial obfuscation tool that makes the Python code resistant to static analysis and decompilation.

Multi-Stage Infection and Persistent Surveillance

The infection chain is built in careful stages. After the LNK file executes, PowerShell reads obfuscated content embedded at a specific offset within the shortcut file and runs it directly in memory. This anti-sandbox technique means the malware simply will not execute if the original file is missing, making it appear clean during automated analysis.

Browser data collection (Source - Cyble)
Browser data collection (Source – Cyble)

The malware then builds a self-contained Python environment inside the user’s AppData folder, a location that does not require administrator access. It names this directory “WindowsHelper” to mimic a legitimate Windows component. Two VBScript launchers run the payload silently, and a Windows Scheduled Task ensures the implant restarts automatically every few minutes, even after a reboot.

Threat Actor Login panel to access stolen data (Source - Cyble)
Threat Actor Login panel to access stolen data (Source – Cyble)

Beyond data collection, the implant can silently download and install RustDesk or AnyDesk, giving the attacker live remote desktop access without any visible window appearing on screen. All stolen data is sent to a command-and-control server hosted on a commercial VPS provider, which was confirmed active as of May 2026.

To reduce exposure, users should treat unexpected compressed files and shortcut attachments in emails with caution. Enabling file extensions in Windows, auditing scheduled tasks regularly, and monitoring for scripting tools running from user-space directories are all practical steps that can catch this type of threat early before significant damage occurs.

Indicators of Compromise (IoCs):-

Type Indicator Description
SHA-256 8a100cbdf79231e70cee2364ebd9a4433fda6b4de4929d705f26f7b68d6aeb79 Initial LNK dropper
SHA-256 9be61c95056fd6b63565cf51a196f2615f5360c0a42e616b2a618473e9d60a21 Malicious RAR archive (Dementyeva_Anna_Vasilyevna_zayavka_gumanitarnaya_pomosch.rar)
SHA-256 a5b782901829861a6f458db404e8ec1a99c65a48393525e681742bb2a5db454d module.pyw (PyArmor-packed Python stealer/RAT)
URL hxxp://159.198.41[.]140/static/builder/lnk_uploads/invo[.]pdf Lure PDF download URL
URL hxxp://159.198.41[.]140/test/index.php?r=survey/index&sid=936926&newtest=Y&lang=ru Survey-based secondary lure URL
URL hxxps://github[.]com/leravalera2/dtfls/releases/download/dtfls/data.zip PyArmor-packed malicious payload hosted on GitHub Releases
IP 159.198.41[.]140 Attacker-controlled C2 server (Namecheap 

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Hackers Abuse Signed Logitech Installer for TCLBANK

Next Post

Fake Moustache Bypasses Age Verification, Raises Online Safety

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DarkMoon AI Autonomous Pen Testing Platform with 50+
May 8, 2026
RansomHouse Claims Access to Trellix Source Code Breach Parts
May 8, 2026
PCPJack Worm Targets Docker, Kubernetes, Redis Credential
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us