Saturday, April 19, 2025
HomeCyber AttackHackers Set Up Fake GitHub Repos to Deliver Malware Posing as Zero-day

Hackers Set Up Fake GitHub Repos to Deliver Malware Posing as Zero-day

Published on

SIEM as a Service

Follow Us on Google News

Recently, the cybersecurity researchers at VulnCheck identified a growing trend of hackers masquerading as cybersecurity researchers on social platforms like Twitter and GitHub. 

While hackers are doing so to spread fake proof-of-concept exploits for the vulnerabilities that are Zero-day in nature and capable of infecting both most used operating systems:-

  • Windows
  • Linux 

Alleged experts affiliated with a fraudulent cybersecurity company, ‘ High Sierra Cyber Security,’ are actively spreading these malicious exploits.

- Advertisement - Google News

Hackers’ primary focus is on cybersecurity researchers and companies actively participating or involved in vulnerability research.

Promoting zero-day Flaws

The repositories appear legitimate, with the individuals responsible for them masquerading as actual security experts from renowned security companies like ‘Rapid7.’ 

Not only that, but they also utilize the pictures of these security professionals to further their deception, based on the report from VulnCheck.

To give their research and code repositories on platforms like GitHub a sense of legitimacy, the same personas also manage Twitter accounts.

Additionally, they exploit social media to lure unsuspecting victims into their traps.

Since May 2023, this malicious campaign has been ongoing and actively promoting zero-day vulnerabilities for the renowned and most used apps, which include:-

  • Chrome
  • Discord
  • Signal
  • WhatsApp
  • Microsoft Exchange

Across all instances, the malicious repositories contain a Python script named ‘poc.py,’ here this script serves as a means of downloading malware on the following systems:-

  • Linux 
  • Windows

The script connects with a distinct website to retrieve a ZIP file, subsequently downloading it onto the targeted computer. 

The choice of the appropriate file is contingent upon the operating system currently in place. As here, both Linux and Windows  users get the same file but with different names that we have mentioned below:-

  • Linux users: ‘cveslinux.zip’
  • Windows users: ‘cveswindows.zip’

Here below we have mentioned the storage directories or locations of the malware:-

  • Windows: %Temp%
  • Linux: /home/<username>/.local/share

The Windows binary inside the ZIP file (‘cves_windows.exe’) raises concerns among more than 60% of antivirus engines on VirusTotal, indicating its potential risk.

Unlike its Windows counterpart, the Linux binary (‘cves_linux’) shows a greater level of stealthiness, managing to evade detection from most of the scanners, as three antivirus scanners managed to detect it.

The exact nature of the installed malware remains uncertain, but both executables install a TOR client. Besides this, the Windows edition is recognized as a trojan with the ability to steal passwords.

Malicious Repositories, Fake GitHub & Twitter Accounts

Here below, we have mentioned the malicious repositories that should be avoided:-

  • https://github.com/AKuzmanHSCS/Microsoft-Exchange-RCE
  • https://github.com/MHadzicHSCS/Chrome-0-day
  • https://github.com/GSandersonHSCS/discord-0-day-fix
  • https://github.com/BAdithyaHSCS/Exchange-0-Day
  • https://github.com/RShahHSCS/Discord-0-Day-Exploit
  • https://github.com/DLandonHSCS/Discord-RCE
  • https://github.com/SSankkarHSCS/Chromium-0-Day

Here below, we have mentioned all the fake Twitter accounts that should be avoided:-

  • https://twitter.com/AKuzmanHSCS
  • https://twitter.com/DLandonHSCS
  • https://twitter.com/GSandersonHSCS
  • https://twitter.com/MHadzicHSCS

Here below, we have mentioned all the fake GitHub accounts that should be avoided:-

  • https://github.com/AKuzmanHSCS
  • https://github.com/RShahHSCS
  • https://github.com/BAdithyaHSCS
  • https://github.com/DLandonHSCS
  • https://github.com/MHadzicHSCS
  • https://github.com/GSandersonHSCS
  • https://github.com/SSankkarHSCS

Looking For an All-in-One Multi-OS Patch Management Platform – 

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Detect Obfuscated Malware That Evades Static Analysis Tools

Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static...

How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks

DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today,...

How to Conduct a Cloud Security Assessment

Cloud adoption has transformed organizations' operations but introduces complex security challenges that demand proactive...

U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents

A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Detect Obfuscated Malware That Evades Static Analysis Tools

Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static...

How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks

DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today,...

U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents

A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a...