Stealthy GitHub Malware Campaign Targets Devs

June 23, 2025, 11:01 p.m.

Description

A new campaign exploiting GitHub to distribute malicious Python code disguised as legitimate hacking tools has been uncovered. The operation, attributed to the group known as Banana Squad, used 67 repositories hosting trojanized files that mimicked benign open-source projects. The attackers exploited GitHub's interface to conceal backdoor code using long space strings, making the malicious content invisible in normal view. Each GitHub account typically hosted one repository, likely fake and created solely to deliver malicious content. Hidden code within the Python files used encoding methods to obscure payload delivery functions. The campaign reflects a shift in open-source software supply chain attacks, with attackers now leveraging more covert tactics to target platforms like GitHub. Developers are advised to verify repositories, avoid reliance on single-repository accounts, and monitor for suspicious domains.

Date

  • Created: June 19, 2025, 10:30 p.m.
  • Published: June 19, 2025, 10:30 p.m.
  • Modified: June 23, 2025, 11:01 p.m.

Indicators

  • dieserbenni.ru
  • 1312services.ru

Attack Patterns

Additional Informations

  • Technology