Saturday, March 8, 2025
Homecyber securityMicrosoft Warns: 1 Million Devices Infected by Malware from GitHub

Microsoft Warns: 1 Million Devices Infected by Malware from GitHub

Published on

SIEM as a Service

Follow Us on Google News

In a recent alert, Microsoft revealed a large-scale malvertising campaign that has compromised nearly one million devices worldwide.

This campaign, which began in early December 2024, leverages malicious redirects from illegal streaming websites to deliver malware hosted on platforms like GitHub.

The attack is notable for its indiscriminate targeting, affecting both consumer and enterprise devices across various industries.

Malvertising Campaign Details

The campaign starts with malvertising redirectors embedded in iframes on pirated video streaming sites.

These redirectors lead users through multiple layers of malicious websites before ultimately landing on GitHub, where the initial malware payloads are hosted.

GitHub
Redirection chain from pirate streaming website to malware files on GitHub

The malware, often disguised as legitimate files, establishes a foothold on the device and acts as a dropper for subsequent payloads.

These additional payloads include information stealers like Lumma and Doenerium, which collect system and browser data.

In some cases, the NetSupport remote monitoring and management (RMM) software is also deployed, allowing for further control over compromised devices.

The attack chain involves multiple stages, each designed to evade detection and persist on the system.

The malware uses living-off-the-land binaries (LOLBAS) such as PowerShell and AutoIT to execute malicious scripts, exfiltrate data, and establish command and control (C2) communications.

The use of legitimate tools like RegAsm.exe and MSBuild.exe for malicious purposes complicates detection efforts.

The attackers also employ techniques like registry modification and scheduled task creation to ensure persistence.

Mitigation and Response

Microsoft recommends several measures to mitigate this threat.

Users should enable tamper protection and network protection in Microsoft Defender for Endpoint and ensure that endpoint detection and response (EDR) is running in block mode.

Additionally, implementing multifactor authentication (MFA) and using phishing-resistant authentication methods can help prevent similar attacks.

Microsoft also advises users to avoid illegal streaming sites and to be cautious of suspicious redirects.

The GitHub security team collaborated with Microsoft to take down the malicious repositories involved in the campaign.

Microsoft’s security tools, including Microsoft Defender XDR, can detect and respond to this threat by identifying suspicious activity and blocking malicious artifacts.

Users are encouraged to stay vigilant and implement robust security measures to protect against evolving threats.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...