Raleigh, NC

32°F
Few Clouds Humidity: 64%
Wind: 2.76 M/S

Security Researchers Targeted by WebRAT via Fake GitHub PoC Exploits

Security Researchers Targeted by WebRAT via Fake GitHub PoC Exploits

Cybercriminals are using fake GitHub repositories to distribute WebRAT, a backdoor and information stealer, by posing as security researchers sharing proof-of-concept exploits for major vulnerabilities.

From Gaming Cheats to Fake Exploits

WebRAT first appeared early this year, originally targeting users through pirated software and video game cheats for titles like Roblox and Counter-Strike. However, since September, the

malware's operators have shifted their strategy to target developers and security professionals.

They create professional looking repositories that claim to provide exploits for critical bugs, including:

  • CVE-2025-59295: A buffer overflow in Windows MSHTML.
  • CVE-2025-10294: An authentication bypass in a WordPress login plugin.
  • CVE-2025-59230: A privilege escalation flaw in the Windows Remote Access Connection Manager.

Deceptive Tactics and AI Content

Kaspersky researchers discovered 15 such repositories where the descriptions and mitigation advice appeared to be generated by AI to enhance credibility. The "exploit" is typically delivered as a password protected ZIP file. Once the victim runs the included dropper, it elevates its own privileges, disables Windows Defender, and installs the WebRAT payload.

The malware maintains a wide range of invasive capabilities, including:

  • Stealing credentials for Steam, Discord, and Telegram.
  • Harvesting cryptocurrency wallet data.
  • Capturing screenshots and spying through webcams.
  • Establishing persistence through Windows Registry modifications and Task Scheduler.

Staying Safe

While the specific repositories identified in this campaign have been removed, researchers warn that this tactic is common and likely to recur under new names. Security enthusiasts and developers are urged to verify sources carefully and always test untrusted code or exploits within isolated, controlled environments to prevent system compromise.

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

Cybersecurity Insight delivers timely updates on global cybersecurity developments, including recent system breaches, cyber-attacks, advancements in artificial intelligence (AI), and emerging technology innovations. Our goal is to keep viewers well-informed about the latest trends in technology and system security, and how these changes impact our lives and the broader ecosystem

Please fill the required field.