Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Iran’s Infy APT resurfaces with new malware activity after years of silence

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fake OSINT and GPT utility GitHub repositories spread PyStoreRAT malware payload
Identity

Fake OSINT and GPT utility GitHub repositories spread PyStoreRAT malware payload

userBy userDecember 12, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers are calling attention to a new campaign that leverages Python repositories hosted on GitHub to distribute a previously undocumented JavaScript-based remote access Trojan (RAT) called PyStoreRAT.

“These repositories, often themed around development utilities or OSINT tools, contain just a few lines of code responsible for silently downloading a remote HTA file and running it via ‘mshta.exe,’” Morphisec researcher Yonatan Edri said in a report shared with The Hacker News.

PyStoreRAT is described as a “modular, multi-stage” implant that can run EXE, DLL, PowerShell, MSI, Python, JavaScript, and HTA modules. The malware also deploys a subsequent payload, an information stealing program known as Rhadamanthys.

The attack chain includes distributing malware via Python or JavaScript loader stubs embedded in GitHub repositories disguised as OSINT tools, DeFi bots, GPT wrappers, and security-themed utilities designed to appeal to analysts and developers.

The first signs of the campaign date back to mid-June 2025, and “repositories” have been steadily rolled out ever since. The tool is promoted through social media platforms such as YouTube and X, as well as artificially inflating a repository’s star and fork metrics. This is a technique reminiscent of Stargazers Ghost Network.

cyber security

The attackers behind this campaign used newly created GitHub accounts, or accounts that had been dormant for months, to publish repositories and secretly leaked malicious payloads in the form of “maintenance” commits in October and November, after the tool started gaining popularity and appeared on GitHub’s top trending list.

In fact, many of the tools did not work as advertised, in some cases simply displaying static menus or non-interactive interfaces, while others performed minimal placeholder operations. The intent behind this operation was to feign legitimacy by abusing GitHub’s inherent trust and tricking users into running the loader stub responsible for starting the infection chain.

This effectively triggers the execution of a remote HTML application (HTA) payload to deliver the PyStoreRAT malware. This payload has the ability to profile the system, check for administrative privileges, and scan the system for cryptocurrency wallet-related files, particularly those related to Ledger Live, Trezor, Exodus, Atomic, Guarda, and BitBox02.

The loader stub collects a list of installed antivirus products and checks for strings matching “Falcon” (a reference to CrowdStrike Falcon) or “Reason” (a reference to Cybereason or ReasonLabs) to reduce visibility. If detected, ‘cmd.exe’ will launch ‘mshta.exe’. Otherwise, run “mshta.exe” directly.

Persistence is achieved by setting up a scheduled task that pretends to self-update NVIDIA apps. In the final stage, the malware connects to an external server to obtain commands to be executed on the host. Some of the supported commands are listed below.

Download and run the EXE payload containing Rhadamanthys Download and extract the ZIP archive Download the malicious DLL and run it using ‘rundll32.exe’ Capture the raw JavaScript code and run it dynamically in memory using eval() Download and install the MSI package Spawn a secondary ‘mshta.exe’ process to load additional remote HTA payloads Directly in memory Execute PowerShell commands Remove files scheduled to spread through removable drives and remove forensic trails by replacing legitimate documents with malicious Windows shortcuts (LNKs)

It is currently unclear who is behind the operation, but the presence of Russian language artifacts and coding patterns suggest an attacker likely of Eastern European origin, Morfisek said.

“PyStoreRAT represents a move towards modular, script-based implants that can adapt to security controls and provide multiple payload formats,” Edri concluded. “By using HTA/JS for execution, a Python loader for delivery, and Falcon-enabled evasion logic, it creates a stealthy first-stage scaffold that traditional EDR solutions can only detect late in the infection chain.”

cyber security

The disclosure came as Chinese security vendor QiAnXin detailed another new remote access Trojan (RAT) codenamed SetcodeRat that has likely been propagating across the country through malvertising lures since October 2025. Hundreds of computers, including government and corporate computers, are said to have been infected over the course of a month.

“The malicious installation package first checks the victim’s region,” QiAnXin Threat Intelligence Center said. If you are from a non-Chinese area, it will end automatically.

The malware disguises itself as a legitimate installer for popular programs such as Google Chrome, and only advances to the next stage if the system language supports Mainland China (Zh-CN), Hong Kong (Zh-HK), Macau (Zh-MO), or Taiwan (Zh-TW). It will also terminate execution if you connect to the Bilibili URL (‘api.bilibili’).[.]com/x/report/click/now”) will fail.

The next step is to launch an executable called “pnm2png.exe”, sideload “zlib1.dll”, and decrypt and execute the contents of a file called “qt.conf”. The decrypted payload is a DLL that embeds the RAT payload. SetcodeRat can connect to Telegram or traditional command and control (C2) servers to obtain instructions and perform data theft.

This allows the malware to take screenshots, log keystrokes, read folders, configure folders, start processes, run cmd.exe, configure socket connections, collect system and network connection information, and update itself to new versions.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePresident Trump’s AI executive order promises ‘one rulebook’ — startups could end up in legal incapacity instead
Next Article So what’s going on with LinkedIn’s algorithm?
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Iran’s Infy APT resurfaces with new malware activity after years of silence

Google and Apple reportedly warned employees with visas to avoid traveling abroad

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.