institutional access

You are connecting from
Lake Geneva Public Library,
please login or register to take advantage of your institution's Ground News Plan.

Published loading...Updated

100+ Backdoored Malware Repos Traced to Single GitHub User

  • Sophos researchers uncovered a large-scale campaign in 2024-2025 where a developer named ischhfd83 used over 130 GitHub repositories with hidden backdoors.
  • The investigation began after a Sophos client questioned the safety of Sakura RAT, a remote access trojan with a malicious PreBuild event that installs malware during compilation.
  • Ischhfd83 automated thousands of fake commits across multiple accounts to simulate legitimacy, targeting gamers, hackers, students, and cybersecurity researchers with lures like cheats and fake exploits.
  • Executing the compromised code initiates a complex infection sequence involving multiple stages where various malicious components—including info-stealers and remote access trojans like Lumma Stealer, AsyncRAT, along with Remcos—are deployed to perform data exfiltration and enable unauthorized system control.
  • Sophos reported and helped remove most malicious repositories, but the campaign's methods remain popular and may evolve to target other groups beyond novice cybercriminals and gamers.
Insights by Ground AI
Does this summary seem wrong?

10 Articles

All
Left
Center
2
Right

If you are looking for open source Trojans on Github, you should be careful. The projects often contain a safe backdoor. (Malware, Virus)

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center
Factuality

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

BleepingComputer broke the news in on Wednesday, June 4, 2025.
Sources are mostly out of (0)