Malicious GitHub Repositories Masquerading as OSINT and AI Tools to Deliver PyStoreRAT Malware

A new malware campaign is distributing a previously undocumented, modular remote access trojan (RAT) called **PyStoreRAT** via deceptive GitHub repositories. The threat actors create and promote Python repositories that pose as legitimate Open Source Intelligence (OSINT) tools, AI utilities, or security software, gaining popularity and trust on the platform. After building credibility, they silently add a malicious payload in a "maintenance" commit; this payload is a simple loader that downloads and executes a remote HTA file, deploying the PyStoreRAT malware. PyStoreRAT acts as a sophisticated backdoor capable of downloading and running additional payloads (like the Rhadamanthys stealer), executing scripts in memory, stealing cryptocurrency wallet data, and maintaining persistence via a disguised scheduled task. The campaign, which shows signs of Eastern European origin, highlights how attackers are abusing the inherent trust in platforms like GitHub to distribute stealthy, script-based malware that can evade traditional endpoint detection. 

https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities