Webrat, disguised as exploits, is spreading via GitHub repositories

Dec. 23, 2025, 5:50 p.m.

Description

A new malware campaign targeting security professionals and students has been uncovered. The threat actor behind Webrat is now disguising the backdoor as exploits and proof-of-concept code for high-profile vulnerabilities, distributing it through GitHub repositories. The malware, which previously spread via game cheats and cracked software, now aims to infect inexperienced security researchers. The campaign uses carefully prepared repositories with AI-generated vulnerability reports to build trust. The malicious files, when executed, disable Windows Defender, escalate privileges, and fetch the Webrat backdoor. This backdoor can steal data from various applications, perform keylogging, and access webcams and microphones. The attack serves as a reminder for cybersecurity professionals to exercise caution when handling potentially malicious files and to use isolated environments for analysis.

Date

  • Created: Dec. 23, 2025, 3:37 p.m.
  • Published: Dec. 23, 2025, 3:37 p.m.
  • Modified: Dec. 23, 2025, 5:50 p.m.

Indicators

  • c687fe537b1e39cf9ecea5e9a9c217550836e6669912b0374d7fe6afcf694f87
  • e6fff1964bf12c46a8c300932ee5cb8d6931482ddf476221e7b11383b5ff2253
  • 825d4a6a9cb3524c7473fb7dbe2253eb6c082d4bb5f82d5e82424d1c1b6f5d65
  • http://ezc5510min.temp.swtest.ru
  • http://shopsleta.ru

Additional Informations

  • ezc5510min.temp.swtest.ru
  • shopsleta.ru

Linked vulnerabilities