GitHub abused to distribute payloads on behalf of malware-as-a-service
3 Articles
3 Articles
GitHub abused to distribute payloads on behalf of malware-as-a-service
Researchers from Cisco’s Talos security team have uncovered a malware-as-a-service operator that used public GitHub accounts as a channel for distributing an assortment of malicious software to targets. The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise networks that rely on the code repository for the software they develop. GitHub removed the three accounts that hosted t…
New Malware-as-a-Service Operation Abuses GitHub Repositories to Deploy Infostealers Like Lumma and Amadey
In the shadowy underbelly of cybersecurity threats, a new breed of malware-as-a-service (MaaS) operation has been unmasked, leveraging the trusted platform of GitHub to disseminate its malicious payloads. According to reporting from Ars Technica, this scheme exploits GitHub’s repositories as a distribution channel that’s often unblocked in corporate and personal networks, allowing cybercriminals to bypass traditional security filters with alarmi…
MaaS harnesses GitHub for payload distribution
Ars Technica reports that malicious payloads have been deployed by a malware-as-a-service operator through the exploitation of public GitHub accounts as part of an attack campaign. Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note: Affiliate link – your enrollment helps support this platform at no extra c…
Coverage Details
Bias Distribution
- 100% of the sources are Center
To view factuality data please Upgrade to Premium