- GitHub gets weaponed as malware -Infrastructure, reports on warns
- Emmenhal and Amadey are part of a coordinated, multi -layer attack chain
- Victims are mostly Ukrainian organizations but all github users must be on their guard
Security researchers have revealed a sophisticated malware-as-a-service (MAAS) operation that utilizes public Github stocks to compromise its goals.
In a blog post, Cisco Talos said the threat actors developed their delivery tactic, moved away from traditional phishing methods and into GitHub, which is often whitelist in corporate environments.
GitHub is an extremely popular platform in the Open Source world and as such is under a constant barrier of attacks. This batch of malicious stocks was removed, just as countless before it.
How to defend against github-bearer attacks
The campaign tried to deliver two malware – families – Emmenthal and Amadey – mostly for organizations in Ukraine.
Emmenthal is a malware loader that usually falls smoked, another loader. While a loader loading a loader doesn’t sound logical at first, there is a strategic reason behind it.
Emmenhal is designed as a stealthy, multistage -downader that is distinguished by initial infection and evasion. When a foothold is secured, it distributes the next phase of the attack to smokeloader, which is a functional modular loader that specializes in post-infection operations.
Amadey, on the other hand, is a botnet that was first stained around 2018, mostly sold on Russian-speaking cybercrime forums. It acts as a modular downloader and system profiles capable of delivering a wide range of malware including information star and ransomware.
In this campaign, Amadey hosted GitHub and disguised in various ways, such as an MP4 file, or embedded in Python scripts like ‘checkbalance.py’.
To defend against this and other threats like that, companies should enforce strict filtration to manuscript-based attachments, keep an eye on PowerShell performance and review Github policies where possible.
They should also go to defense in depth and behavioral surveillance as these can help spot shadowed download patterns, or payloads performed on targeted machines.



