We bring you the latest news and alerts detected from Cybersecurity
Vulnerabilities
A Meta AI chatbot bug may have allowed access to private conversations
Oracle fixes 309 vulnerabilities in its July patch update
Cybersecurity
$27 million stolen from BigONE exchange after cyberattack
3.3 million Anne Arundel Dermatology patient records exposed after unauthorized database access
Malware
Threat actors target Exchange servers in government environments across Asia using the GhostContainer backdoor
Chinese cybercriminals attack Taiwan's semiconductor sector with Cobalt Strike and custom backdoors
Latest threats detected
New malware campaign uses GitHub repositories
21/07/2025
Executive Summary
A new malware campaign has been detected that uses GitHub repositories to distribute the Emmental loader.
Data
Type:
TLP:
Objectives
Targets:
Affected assets:
Attack vector:
Malware
White
Múltiple
Multiple
Multiple
stealer Amadey, Emmental, GitHub, malware
Description
A new malware campaign has been detected in which malicious actors are using public GitHub repositories as infrastructure to distribute malware, taking advantage of the trust associated with these legitimate platforms. The campaign focuses on spreading the Emmental loader, which subsequently downloads trojans such as Amadey and remote access tools (RATs).
Technical Details
A malicious campaign has been uncovered in which threat actors are using public GitHub repositories to host and distribute the loader known as Emmental (also identified as PEAKLIGHT). This tool is responsible for downloading and executing malware like Amadey, a trojan primarily focused on information theft and acting as a dropper (loader) for other threats. The actors created multiple fake GitHub accounts with names such as Legendary99999, DFfe9ewf, Milidmdds, and bruhbruh9999, and uploaded malicious binaries disguised as legitimate software. These files were presented as plugins or useful tools but actually contained secondary payloads such as information stealers and RATs like AsyncRAT. Although the repositories have been taken down by GitHub, the technique demonstrates how attackers exploit legitimate platforms to evade detection by traditional security solutions.
The Emmental loader not only downloads Amadey directly from GitHub but also uses PowerShell scripts and malicious versions of popular applications like PuTTY to execute payloads. In some cases, the PowerShell scripts download malicious content from hardcoded IP addresses, allowing attackers to maintain control over the infection chain. Additionally, a Python-written variant of the Emmental loader was observed, featuring similar logic for malware download and execution. These loaders not only delivered Amadey but also additional modules designed to capture screenshots, collect browser credentials, and steal data from Telegram or VPN applications.
Recommendations
Protection
Detection
Mitigation
References
https://thehackernews.com/2025/07/hackers-use-github-repositories-to-host.html
Minsait Cyber
We promote the transformation of business and society through innovative solutions and services, putting people at the center.
Indra is one of the leading global technology and consulting companies: the technology partner for key operations of client businesses worldwide.
Tel.: +34 91 480 50 00
We promote the transformation of business and society through innovative solutions and services, putting people at the center.
Indra is one of the leading global technology and consulting companies: the technology partner for key operations of client businesses worldwide.