Sophos X-Ops researchers have recognized over 140 GitHub repositories laced with malicious backdoors, orchestrated by a single menace actor related to the e-mail deal with ischhfd83[at]rambler[.]ru.
Initially sparked by a buyer inquiry into the Sakura RAT, a supposed open-source malware touted for its “refined anti-detection capabilities,” the investigation revealed a much wider and extra insidious marketing campaign.
Uncovering a Net of Backdoored Repositories
The Sakura RAT itself proved non-functional for its meant objective, however its repository harbored hidden malicious code designed to not goal typical victims, however somewhat novice cybercriminals and avid gamers in search of cheats.
This tactical pivot menace actors focusing on their very own sort underscores a rising pattern of infighting inside the cybercrime ecosystem, the place even aspiring hackers will not be protected from deception.
Delving deeper, the workforce uncovered 133 backdoored repositories out of the 141 recognized, using 4 distinct kinds of backdoors: PreBuild occasion scripts in Visible Fundamental venture recordsdata, Python scripts, screensaver (.scr) recordsdata disguised as resolution recordsdata, and JavaScript payloads.
The PreBuild backdoor, present in 111 repositories, leverages encoded batch instructions inside .vbproj recordsdata to execute a multi-stage an infection chain.

This begins with a VBS script that spawns a PowerShell script, finally downloading a malicious 7z archive named SearchFilter.7z from GitHub releases.
Refined An infection Chains
As soon as extracted utilizing a hardcoded password, it deploys an Electron-based utility, TeamsPackage, which embeds infostealers and RATs like AsyncRAT, Remcos, and Lumma Stealer.
The Python backdoors, hidden by way of whitespace obfuscation, and JavaScript variants equally route via encoded URLs hosted on paste websites like Pastebin and glitch[.]me, culminating in the identical payload.
The screensaver backdoors, utilizing Unicode right-to-left override methods to masquerade as official recordsdata, additionally level to historic payloads linked to AsyncRAT, demonstrating the menace actor’s persistent and evolving ways.
The size of this operation is staggering, with repositories exhibiting automated commits some reaching almost 60,000 to feign legitimacy and entice downloads.
Predominantly themed round gaming cheats (58%) and malware instruments (24%), these repositories exploit the naivety of inexperienced menace actors and curious avid gamers.
Distribution doubtless happens by way of underground boards, Discord servers, and YouTube channels, with inadvertent amplification via media protection of Sakura RAT.

Sophos reported the lively repositories to GitHub, ensuing within the takedown of most, alongside notifications to stick web site operators internet hosting intermediate malicious content material.
Hyperlinks to prior campaigns, such because the Stargazer Goblin Distribution-as-a-Service operation reported by Examine Level in 2024, counsel this actor could also be half of a bigger community or a repeat offender lively since not less than 2022.
Identifiers like “Unknown” and “Muck” recurrent in code feedback, encryption keys, and staging URLs trace at a constant persona, although their precise function stays underneath investigation.
This marketing campaign’s complexity, from obfuscated an infection chains to Telegram-based C2 notifications, reveals a calculated effort to maximise infections amongst a distinct segment viewers.
For the cybersecurity neighborhood, it serves as a reminder to scrutinize open-source code meticulously and execute unverified repositories solely in remoted environments.
As menace actors refine such misleading methods, the danger of collateral harm to unintended victims looms giant, necessitating heightened vigilance throughout all person teams.
To Improve Your Cybersecurity Expertise, Take Diamond Membership With 150+ Sensible Cybersecurity Programs On-line – Enroll Right here