Wednesday, April 16, 2025
Homecyber securityMicrosoft Warns: 1 Million Devices Infected by Malware from GitHub

Microsoft Warns: 1 Million Devices Infected by Malware from GitHub

Published on

SIEM as a Service

Follow Us on Google News

In a recent alert, Microsoft revealed a large-scale malvertising campaign that has compromised nearly one million devices worldwide.

This campaign, which began in early December 2024, leverages malicious redirects from illegal streaming websites to deliver malware hosted on platforms like GitHub.

The attack is notable for its indiscriminate targeting, affecting both consumer and enterprise devices across various industries.

- Advertisement - Google News

Malvertising Campaign Details

The campaign starts with malvertising redirectors embedded in iframes on pirated video streaming sites.

These redirectors lead users through multiple layers of malicious websites before ultimately landing on GitHub, where the initial malware payloads are hosted.

GitHub
Redirection chain from pirate streaming website to malware files on GitHub

The malware, often disguised as legitimate files, establishes a foothold on the device and acts as a dropper for subsequent payloads.

These additional payloads include information stealers like Lumma and Doenerium, which collect system and browser data.

In some cases, the NetSupport remote monitoring and management (RMM) software is also deployed, allowing for further control over compromised devices.

The attack chain involves multiple stages, each designed to evade detection and persist on the system.

The malware uses living-off-the-land binaries (LOLBAS) such as PowerShell and AutoIT to execute malicious scripts, exfiltrate data, and establish command and control (C2) communications.

The use of legitimate tools like RegAsm.exe and MSBuild.exe for malicious purposes complicates detection efforts.

The attackers also employ techniques like registry modification and scheduled task creation to ensure persistence.

Mitigation and Response

Microsoft recommends several measures to mitigate this threat.

Users should enable tamper protection and network protection in Microsoft Defender for Endpoint and ensure that endpoint detection and response (EDR) is running in block mode.

Additionally, implementing multifactor authentication (MFA) and using phishing-resistant authentication methods can help prevent similar attacks.

Microsoft also advises users to avoid illegal streaming sites and to be cautious of suspicious redirects.

The GitHub security team collaborated with Microsoft to take down the malicious repositories involved in the campaign.

Microsoft’s security tools, including Microsoft Defender XDR, can detect and respond to this threat by identifying suspicious activity and blocking malicious artifacts.

Users are encouraged to stay vigilant and implement robust security measures to protect against evolving threats.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a...

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted...

Hacktivist Group Becomes More Sophisticated, Targets Critical Infrastructure to Deploy Ransomware

A recent report by Cyble has shed light on the evolving tactics of hacktivist...

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a...

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted...

Hacktivist Group Becomes More Sophisticated, Targets Critical Infrastructure to Deploy Ransomware

A recent report by Cyble has shed light on the evolving tactics of hacktivist...