Tuesday, March 4, 2025
HomeCyber AttackXeno RAT Attacking Users Via GitHub Repository And .gg Domains

Xeno RAT Attacking Users Via GitHub Repository And .gg Domains

Published on

SIEM as a Service

Follow Us on Google News

Threat actors use RATs because they provide attackers with persistent access to compromised systems, enabling long-term espionage and exploitation.

North Korean hackers and other actors who target the gaming community are using free malware on GitHub called XenoRAT.

Hunt’s research team found it spreading through .gg domains and a GitHub repository that pretended to be Roblox scripting tools.

Xeno RAT Attacking Via GitHub

The ASEC division of AhnLab claimed it had evidence of a North Korea-related group employing Dropbox to send XenoRAT.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

Besides this, one investigator discovered the software in an open directory that the Kimsuky threat group probably controls.

An increasing risk like this uses crafty approaches to reach out to gamers and developers across platforms with numerous tricks.

On XenoRAT’s GitHub page, you will find more advanced features such as HVNC, audio spying, and SOCKS5 reverse proxy.

Communication between clients and the controller is done through TCP sockets, and this follows an identifiable pattern that can be used to identify malicious activities.

The worrying point is that the malware is being distributed in .gg domains, which are popular within the esports community and target gamers. The network IDS rules for detection are available on the ET website.

It shows how threat actors increasingly use well-known platforms and communities to spread their tools.

The discovery of SynapseX.revamped.V1.2.rar, an untrusted file that communicated with .gg sites resulted in the creation of a GitHub repository disguised as Roblox scripting engine.

YouTube Account Associated with Xeno RAT & Quasar Distribution (Source – Hunt.io)

The repository contained several harmful executable files, such as XenoRAT and Quasar. Earlier, this GitHub user recognized one file as XWorm malware.

Further inquiries revealed that a YouTube channel called “P-Denny Gaming” was linked to it, which recommended that users turn off Windows Defender before installing that malware.

YouTube Video Instructing Users to Install Synapse X File (Source – Hunt.io)

The content of the channel, together with its comments, tried to make these malicious files appear genuine.

The XenoRAT and other malware are very dangerous to the gaming communities when distributed through .gg domains as well as on GitHub.

These threats take advantage of gamers’ trust in good-looking tools that may result in the possible theft of personal data, game items, and financial details.

Using open-source platforms for malware distribution increases the chances of widespread infections.

Even if users are inclined to download or install software from sites they regard as trustworthy, they should be extremely careful.

For a safe internet gaming environment, one needs to be extra cautious and doubtful since these complex social engineering ploys most affect the gaming community.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Raga Varshini
Raga Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...