Press "Enter" to skip to content
Dangerous WebRAT malware now being spread by GitHub repositories

Dangerous WebRAT Malware Spread By GitHub Repositories

15 Malicious GitHub Repositories Deploy WebRAT Malware Through Fake Security Exploits – Cybersecurity Alert
COMPUTER SECURITY ALERT
Cybersecurity / Threat Intelligence

15 Malicious GitHub Repositories Deploy WebRAT Malware Through Fake Security Exploits

AI-generated repositories targeting security researchers with backdoor and infostealer disguised as proof-of-concept vulnerability exploits

Cybercriminals have deployed a sophisticated campaign targeting security researchers through malware-laden fake proof-of-concept exploits hosted on GitHub, with cybersecurity experts identifying 15 malicious repositories apparently crafted using generative artificial intelligence.

Active Threat

GitHub has removed the identified repositories, but victims who downloaded packages before removal remain infected and must manually eradicate the WebRAT malware from their systems. Additional undiscovered malicious repositories may still exist.

Campaign Overview

15
Malicious Repositories
Sept 2025
Campaign Start Date
3+
Months Active

The campaign, active since September 2025, represents a targeted attack on security researchers and potentially other cybercriminals who frequently download and analyze proof-of-concept exploits as part of their work.

Targeted Vulnerabilities

The malicious repositories claimed to provide exploits for multiple legitimate vulnerabilities that had been discovered and reported in media:

Impersonated Vulnerabilities
  • Heap-based buffer overflow in Windows MSHTML/Internet Explorer
  • Critical authentication bypass in OwnID Passwordless Login plugin for WordPress
  • Elevation-of-privilege flaw in Windows Remote Access Connection Manager

By mimicking high-profile, recently disclosed vulnerabilities, the threat actors ensured their repositories would attract security researchers actively investigating these flaws.

Role of Generative AI

Cybersecurity researchers indicated the repositories were apparently crafted with the help of Generative Artificial Intelligence. This suggests AI tools were used to create convincing repository descriptions, documentation, and possibly code structure that would appear legitimate to security professionals.

AI-Assisted Cybercrime

The use of generative AI enables threat actors to rapidly create multiple convincing fake repositories with professional-appearing documentation and code samples. This represents an evolution in social engineering tactics, leveraging AI to scale deception and target technical audiences who typically exhibit heightened security awareness.

Infection Chain: Technical Analysis

Victims who downloaded the malicious packages received a carefully constructed infection chain designed to deploy the WebRAT malware:

Package Contents
  • Password-protected ZIP archive (adds legitimacy; researchers expect PoC exploits to be secured)
  • Empty file (decoy to avoid immediate suspicion)
  • Fake DLL file (serves as additional decoy)
  • Batch file (execution component)
  • rasmanesc.exe (malicious dropper masquerading as legitimate Windows component)

Dropper Behavior

The rasmanesc.exe dropper executes a multi-stage attack:

1. Privilege Escalation: The dropper elevates its system privileges to gain administrator-level access

2. Defender Disabling: Windows Defender is disabled to prevent detection and removal

3. WebRAT Download: The dropper retrieves the WebRAT malware payload from a command-and-control server

Evasion Technique
The name “rasmanesc.exe” appears designed to mimic legitimate Windows system files related to the Remote Access Connection Manager service (rasman), potentially evading cursory inspection by users familiar with Windows processes.

WebRAT Malware Capabilities

WebRAT functions as both a backdoor and an infostealer, providing threat actors with extensive access to compromised systems:

Primary Functions

WebRAT Capabilities
  • Credential Theft: Steals login credentials for Steam, Discord, and Telegram accounts
  • Cryptocurrency Wallet Access: Extracts information from any cryptocurrency wallets installed on the system
  • Browser Extension Data: Harvests data from browser add-ons and extensions
  • Webcam Surveillance: Activates webcam for remote video surveillance of victims
  • Screen Capture: Takes screenshots of victim’s desktop activity
  • Backdoor Access: Provides persistent remote access to compromised systems
Targeting Logic

The specific focus on gaming platforms (Steam), communication tools (Discord, Telegram), and cryptocurrency wallets suggests the threat actors are targeting researchers and cybercriminals who frequently use these services. Security researchers often maintain accounts on these platforms for threat intelligence gathering, while cybercriminals use them for coordination and cryptocurrency transactions.

Target Profile: Security Researchers and Cybercriminals

The campaign specifically targets two overlapping populations:

Security Researchers: Professionals who regularly download and analyze proof-of-concept exploits as part of vulnerability research and threat intelligence activities.

Cybercriminals: Threat actors who seek working exploits for offensive purposes, making them potential victims of attacks by competing criminal groups.

Ironic Targeting
The campaign’s targeting of security professionals—individuals with heightened security awareness—demonstrates the effectiveness of social engineering when combined with legitimate-appearing technical content hosted on trusted platforms.

GitHub as Attack Vector

GitHub represents an ideal platform for this attack strategy due to several factors:

High trust level among developers and security researchers
Size and popularity in software development and cybersecurity communities
Legitimate use case for hosting proof-of-concept exploits
Easy discoverability through search functionality
Professional appearance lending credibility to malicious repositories

Typosquatting Threat

GitHub’s size and popularity make it a major target for cybercriminals who frequently attempt typosquatting—creating malicious repositories with names similar to legitimate packages. Users downloading packages through automated tools or quickly typing repository names may inadvertently access malicious versions.

Current Status and Remediation

GitHub has removed all 15 identified malicious repositories from its platform. However, this removal does not address infections that occurred prior to takedown.

Critical Remediation Steps

For Potentially Affected Users:

1. Assume compromise if you downloaded any proof-of-concept exploits from GitHub between September and December 2025

2. Search for processes named rasmanesc.exe or similar Windows-mimicking executables

3. Check for disabled security software, particularly Windows Defender

4. Scan with multiple tools as WebRAT may have disabled primary antivirus

5. Change all credentials for Steam, Discord, Telegram, and cryptocurrency wallets

6. Review webcam activity and consider covering webcams when not in use

7. Monitor for persistent backdoor access even after initial removal attempts

Ongoing Risk

Security researchers warn that the 15 identified repositories likely do not represent the complete scope of the campaign. Additional malicious repositories may exist that have not yet been discovered or reported.

Continued Vigilance Required
Users should exercise extreme caution when downloading any packages from GitHub or other repositories, particularly those claiming to contain proof-of-concept exploits for recently disclosed vulnerabilities. The removal of known malicious repositories does not eliminate the threat.

Best Practices for Security Researchers

To protect against similar attacks, security professionals should implement the following practices:

Use isolated environments (virtual machines, sandboxes) when analyzing untrusted code
Verify repository authenticity through commit history, contributor profiles, and community feedback
Cross-reference with official advisories from vulnerability researchers before downloading PoCs
Examine code before execution rather than running packages sight-unseen
Monitor for typosquatting by carefully verifying repository names and URLs
Maintain updated threat intelligence on active campaigns targeting researchers
Use security tools that can detect privilege escalation and security software disabling

Broader Implications

This campaign highlights several concerning trends in cybersecurity:

1. AI-Accelerated Social Engineering: Generative AI enables rapid creation of convincing malicious content at scale, lowering barriers for sophisticated attacks.

2. Targeting Security Professionals: Even highly trained individuals with security awareness can be victimized when malicious content appears in expected contexts.

3. Platform Trust Exploitation: Trusted platforms like GitHub become attack vectors precisely because of their legitimacy and widespread use.

4. Criminal-on-Criminal Activity: The potential targeting of cybercriminals alongside researchers suggests internal conflict within threat actor communities.

5. Persistent Access Priority: The backdoor functionality indicates long-term access goals beyond immediate credential theft.

Conclusion

The discovery of 15 AI-generated malicious repositories targeting security researchers through fake proof-of-concept exploits represents a sophisticated supply chain attack on the cybersecurity community itself. The campaign’s three-month duration before detection suggests the approach was effective at evading scrutiny from its intended victims.

Key takeaways include:

Confirmed infections require manual remediation as repository removal does not clean compromised systems

Additional malicious repositories likely remain undiscovered, requiring ongoing vigilance

AI integration in cybercrime enables more convincing and scalable social engineering attacks

Security professionals remain vulnerable despite heightened awareness when attacks appear in expected contexts

Trusted platforms require verification procedures even when downloading from apparently legitimate sources

For the cybersecurity community, this incident underscores the need for enhanced verification procedures when downloading code from any source, including repositories with professional appearances on trusted platforms. The use of isolated analysis environments and code review before execution remain critical defensive practices.

Threat intelligence analysis based on cybersecurity research. Users potentially affected by downloads from GitHub between September-December 2025 should follow remediation procedures immediately.

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *