GitHub Gone Rogue: WebRAT Malware Sneaks Through Fake Exploits!
WebRAT malware is branching out from dodgy game cheats to GitHub, where it hides in fake exploits for recent vulnerabilities. This backdoor, with a knack for info-stealing, is now masquerading alongside proof-of-concept exploits, proving once again that even malicious software can have a career pivot. Stay cautious, code testers!

Hot Take:
Looks like GitHub is the new candy store for cybercriminals, and they’re handing out WebRAT malware like it’s the hottest new trend. Who needs Halloween when you’ve got trickery like this year-round?
Key Points:
- WebRAT malware is now being distributed via GitHub repositories disguised as proof-of-concept exploits for known vulnerabilities.
- Originally spread through pirated software and game cheats, WebRAT has info-stealing capabilities targeting apps like Steam, Discord, and Telegram.
- Kaspersky found 15 GitHub repositories distributing WebRAT, likely using AI-generated text to enhance credibility.
- The malware achieves persistence by modifying the Windows Registry, using the Task Scheduler, and more.
- All identified malicious GitHub repositories have been removed, but caution is advised when dealing with untrusted sources.
Already a member? Log in here
