CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

PyStoreRAT Malware Distributed via Fake GitHub Repositories

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A new campaign is distributing PyStoreRAT, a modular JavaScript-based Remote Access Trojan (RAT), through GitHub repositories masquerading as OSINT tools, DeFi bots, and GPT wrappers. The malware, which deploys the Rhadamanthys information stealer as a follow-on payload, has been active since mid-June 2025. Attack chains involve loader stubs that execute a remote HTA file, leading to system profiling, privilege checks, and cryptocurrency wallet file scanning. The threat actors use social media promotion and artificial metrics inflation to lend legitimacy to the repositories.

Timeline

  1. 12.12.2025 20:50 1 articles · 23h ago

    PyStoreRAT Malware Campaign Active Since Mid-June 2025

    A new campaign distributing PyStoreRAT, a modular JavaScript-based RAT, has been active since mid-June 2025. The malware is spread through GitHub repositories themed as OSINT tools, DeFi bots, and GPT wrappers. The repositories contain minimal code to download and execute a remote HTA file, leading to system profiling, privilege checks, and cryptocurrency wallet file scanning. The threat actors use social media promotion and artificial metrics inflation to lend legitimacy to the repositories.

    Show sources

Information Snippets