Thursday, April 10, 2025
HomeCyber AttackXeno RAT Attacking Users Via GitHub Repository And .gg Domains

Xeno RAT Attacking Users Via GitHub Repository And .gg Domains

Published on

SIEM as a Service

Follow Us on Google News

Threat actors use RATs because they provide attackers with persistent access to compromised systems, enabling long-term espionage and exploitation.

North Korean hackers and other actors who target the gaming community are using free malware on GitHub called XenoRAT.

Hunt’s research team found it spreading through .gg domains and a GitHub repository that pretended to be Roblox scripting tools.

- Advertisement - Google News

Xeno RAT Attacking Via GitHub

The ASEC division of AhnLab claimed it had evidence of a North Korea-related group employing Dropbox to send XenoRAT.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

Besides this, one investigator discovered the software in an open directory that the Kimsuky threat group probably controls.

An increasing risk like this uses crafty approaches to reach out to gamers and developers across platforms with numerous tricks.

On XenoRAT’s GitHub page, you will find more advanced features such as HVNC, audio spying, and SOCKS5 reverse proxy.

Communication between clients and the controller is done through TCP sockets, and this follows an identifiable pattern that can be used to identify malicious activities.

The worrying point is that the malware is being distributed in .gg domains, which are popular within the esports community and target gamers. The network IDS rules for detection are available on the ET website.

It shows how threat actors increasingly use well-known platforms and communities to spread their tools.

The discovery of SynapseX.revamped.V1.2.rar, an untrusted file that communicated with .gg sites resulted in the creation of a GitHub repository disguised as Roblox scripting engine.

YouTube Account Associated with Xeno RAT & Quasar Distribution (Source – Hunt.io)

The repository contained several harmful executable files, such as XenoRAT and Quasar. Earlier, this GitHub user recognized one file as XWorm malware.

Further inquiries revealed that a YouTube channel called “P-Denny Gaming” was linked to it, which recommended that users turn off Windows Defender before installing that malware.

YouTube Video Instructing Users to Install Synapse X File (Source – Hunt.io)

The content of the channel, together with its comments, tried to make these malicious files appear genuine.

The XenoRAT and other malware are very dangerous to the gaming communities when distributed through .gg domains as well as on GitHub.

These threats take advantage of gamers’ trust in good-looking tools that may result in the possible theft of personal data, game items, and financial details.

Using open-source platforms for malware distribution increases the chances of widespread infections.

Even if users are inclined to download or install software from sites they regard as trustworthy, they should be extremely careful.

For a safe internet gaming environment, one needs to be extra cautious and doubtful since these complex social engineering ploys most affect the gaming community.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Raga Varshini
Raga Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers...

Linux Firewall IPFire 2.29 Launches with Post-Quantum Encryption and System Enhancements

The open-source Linux firewall solution, IPFire, has officially released its latest version, IPFire 2.29 - Core...

‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely

A sophisticated new red team technique dubbed "RemoteMonologue" has emerged, enabling attackers to remotely...

OpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements

The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers...

Linux Firewall IPFire 2.29 Launches with Post-Quantum Encryption and System Enhancements

The open-source Linux firewall solution, IPFire, has officially released its latest version, IPFire 2.29 - Core...

‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely

A sophisticated new red team technique dubbed "RemoteMonologue" has emerged, enabling attackers to remotely...