Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New Phishing Platform Used in Credential Theft Campaigns

April 3, 2026

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

April 3, 2026

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

April 3, 2026
Facebook X (Twitter) Instagram
Friday, April 3
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»GitHub Used as Covert Channel in Multi-Stage Malware Campaign
News

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

Team-CWDBy Team-CWDApril 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A series of malicious LNK files targeting users in South Korea has been detected using a multi-stage attack chain that uses GitHub as command and control (C2) infrastructure.

The campaign relies on scripting, encoded payloads and legitimate Windows tools to maintain persistence while avoiding detection. Earlier versions of the attack date back to 2024 but contained more metadata and simpler obfuscation, allowing researchers to track links to earlier malware campaigns.

According to a new advisory published by Fortinet on April 2, recent versions show clear changes in tactics.

The attacker now embeds decoding functions directly within LNK file arguments and includes encoded payloads inside the files themselves. Decoy PDF documents are used to distract victims while malicious scripts execute silently in the background. The files appear legitimate when opened, while PowerShell scripts run without the user’s knowledge.

“Modern cyber espionage has fundamentally shifted toward a highly evasive strategy known as living-off-the-land [LOTL],” said Jason Soroko, senior fellow at Sectigo.

Multi-Stage Infection Process

The attack begins with LNK files containing hidden scripts that retrieve PowerShell commands from GitHub.

As mentioned above, later variants introduced decoding functions and removed identifying metadata, making attribution more difficult. The files drop a decoy PDF while silently executing PowerShell scripts in the background.

In the second stage, the PowerShell script performs several tasks designed to keep the attack hidden and maintain access to the system, including:

  • Checking for virtual machines (VM) or security analysis tools

  • Decoding and storing additional payloads

  • Creating scheduled tasks for persistence

  • Collecting system information

  • Uploading logs to GitHub repositories

The malware creates scheduled tasks that run every 30 minutes using VBScript to execute hidden PowerShell commands. System information such as OS version, last boot time and running processes is collected and exfiltrated to GitHub using hardcoded access tokens.

Read more on malware persistence techniques: Chinese Hackers Use Trusted ArcGIS App For Year-Long Persistence

Persistent Access Through GitHub

In the final stage, the malware continuously connects to GitHub repositories to download additional instructions or modules, maintaining communication with the attacker and enabling further activity on compromised systems.

A keep-alive script uploads network configuration details, allowing the attacker to monitor infected machines and maintain access over time.

“This attack demonstrates how malicious actors can turn legitimate infrastructure into a novel attack surface,” said Jamie Boote, senior manager at Black Duck.

“The fact that this shortcut file creates a chain that ultimately reaches out to a GitHub repository, and pulls scripts over the internet, should put network defenders on alert that even productivity platforms can be attack vectors,” he added.

By using Windows built-in utilities and GitHub infrastructure, attackers can indeed blend malicious traffic with normal activity, making detection significantly more difficult for corporate security systems.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
Next Article WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
Team-CWD
  • Website

Related Posts

News

New Phishing Platform Used in Credential Theft Campaigns

April 3, 2026
News

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

April 3, 2026
News

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

April 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

What it takes to fool facial recognition

March 14, 2026

What’s at stake if your employees post too much online

December 1, 2025

How to tell if a voice call is AI or not

February 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.