Command Palette

Search for a command to run...

Security Intel Hub
DashboardIntelligenceCVEsThreat Actors
LIVE
HomeIntelligenceGitHub Used as Covert Channel in Multi-Stage Malware Campaign
MEDIUMMalware
Global

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

Thursday, April 2, 2026 at 01:00 PM UTC·Source: Infosecurity Magazine

Updated: Thursday, April 2, 2026 at 05:46 PM UTC

Executive Summary

LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration

Analysis

LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration
Source Attribution

Originally published by Infosecurity Magazine on Apr 2, 2026.

Related Threats

MEDIUMMalware

Claude Code leak used to push infostealer malware on GitHub

Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware. [...]

8h agoBleepingComputer
MEDIUMMalware

Bank Trojan 'Casbaneiro' Worms Through Latin America

Augmented Marauder's multipronged banking-Trojan cyber campaigns are targeting Spanish speakers, evading detection, and replicating rapidly.

16h agoDark Reading
MEDIUMMalware

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023. "Beyond cryptomining, the threat actor monetizes infections through CPA (Cost Per Action) fraud, directing victims to content locker pages under the guise of software registration," Elastic

17h agoThe Hacker News

Industry Impact

technology

Attack Vector

See source for details

Tags

Security Intel Hub

The institutional standard for cybersecurity intelligence. Trusted by security teams worldwide.

Intelligence

  • Intelligence
  • CVE Search
  • Threat Actors

Industries

  • Healthcare
  • Finance
  • Government
  • Energy

Company

  • About
  • Help & Contact
© 2026 Security Intel Hub. All rights reserved. Intelligence data sourced from verified public sources.