Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

Cognitive AI ignores turbulence and valuates $10.2 billion with a $400 million salary increase

Compromise on GitHub accounts resulted in SalesLoft drift violations affecting 22 companies

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » GPUGATE malware uses Google ads and fake Github commits to target IT companies
Identity

GPUGATE malware uses Google ads and fake Github commits to target IT companies

userBy userSeptember 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 8th, 2025Ravi LakshmananAggravated/Encrypted

Cybersecurity researchers detail new sophisticated malware campaigns that leverage paid advertising in search engines such as Google to provide malware to unsuspecting users looking for popular tools such as GITHUB desktops.

Malvertising campaigns have become common in recent years, but the latest activities have given them a bit of a twist on their own. Embedding a github commit in a page URL that contains a modified link pointing to the infrastructure controlled by the attacker.

“Even if a link appears to refer to a reputable platform like GitHub, you can still manipulate the underlying URL to resolve it to a forged site,” Arctic Wolf said in a report published last week.

It has been targeted only to software developers in Western Europe since at least December 2024. Links within RogueGithub commits are designed to inject users into malicious downloads hosted in domains like the appearance (“gitpage[.]App”.

Audit and subsequent

The first stage malware delivered using addicted search results is a bloated 128 MB Microsoft Software Installer (MSI), whose size avoids most existing online security sandboxes, and the Gate Decoration routine of the Graphic Processing Unit (GPU) encrypts piloads on the system without the actual GPU. This technique is called the codename gpugate.

“A system without the right GPU driver is likely to be a virtual machine (VM), sandbox, or an older analytical environment commonly used by security researchers,” the cybersecurity company said. “Executable file” […] When you use GPU functions to generate an encryption key to decrypt the payload, it checks the GPU device name to do this. ”

In addition to incorporating some garbage files as fillers and incorporating complex analysis, it also terminates execution if the device name is less than 10 characters or if the GPU function is unavailable.

The attack then involves running a visual basic script that launches a PowerShell script. This runs with administrator privileges, adds Microsoft Defender exclusions, sets up scheduled tasks for persistence, and runs the executable file extracted from the last downloaded ZIP archive.

The ultimate goal is to promote information theft, provide secondary payloads and avoid detection at the same time. Given the presence of Russian comments in PowerShell scripts, the threat actors behind the campaign are rated as having native Russian proficiency.

Further analysis of the domain of threat actors reveals that it serves as the staging foundation for Atomic Makos Steelers (AMOS), suggesting a cross-platform approach.

“By leveraging Github’s commit structure and leveraging Google Ads, threat actors can convincingly mimic legal software repositories and redirect users to malicious payloads.

CIS Build Kit

Disclosure occurs as Acronis has detailed the ongoing evolution of the troilerized Connectwise Screenconnect campaign, which uses Asyncrat, PureHVNC rats, and custom PowerShell-based remote access Trojans (rats) using remote access software to drop infected hosts of social engineering attacks targeted by US organizations since March 2025.

A bespoke PowerShell rat, run by JavaScript files downloaded from the Cracked ScreenConnect server, provides basic functionality such as running programs, file download and execution, and a simple persistence mechanism.

“Attackers now use the clickonce runner installer for screenconnect, which does not have a built-in configuration and instead retrieves the components at runtime,” the security vendor said. “This evolution has led to the lack of traditional static detection methods being less effective, complicating prevention and few options for defenders to trust.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleY Combinator Assistance Motion raises fresh $38 million to build an AI agent Microsoft Office
Next Article YouTube’s first exclusive NFL broadcast attracts over 17 million viewers
user
  • Website

Related Posts

Compromise on GitHub accounts resulted in SalesLoft drift violations affecting 22 companies

September 8, 2025

Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More

September 8, 2025

You weren’t phished – you carried an attacker

September 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

Cognitive AI ignores turbulence and valuates $10.2 billion with a $400 million salary increase

Compromise on GitHub accounts resulted in SalesLoft drift violations affecting 22 companies

YouTube’s first exclusive NFL broadcast attracts over 17 million viewers

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.