I've spent the last several hours investigating what I initially thought was a single malicious fork of a macOS app. It turns out to be part of a massive, coordinated campaign with hundreds of active malicious repositories.
Automated malware distribution campaign targeting GitHub users. Distinct pattern makes it easy to identify but GitHub hasn't taken action despite reports.
I am keeping an ongoing list here: https://brennan.paste.lol/fork-malware-urls-found.md
github.com/KUNDANIOS/TheCha86github.com/Wothan12/KavaHubgithub.com/usamajhn/Cute-Writing-Assistantgithub.com/msksystem/ZeroScoutgithub.com/ershikwa/mlwr_blogsVirusTotal detection: Low (12/66 vendors) suggesting recent deployment
MITRE ATT&CK Tactics: - Execution (T1059) - Defense Evasion (T1140, T1497, T1562) - Discovery (T1082, T1012, T1057) - Command & Control (T1071, T1573, T1090)
This is not isolated. Hundreds of repos following identical patterns. The consistency suggests bot-driven deployment. Repos updated within the last 24 hours.
This is happening alongside Shai-Hulud, WebRAT, PyStoreRAT, and Banana Squad campaigns.
Searching GitHub for repositories with: - Topics including "malware", "deobfuscation", "symbolic-execution" - README with emoji headers + direct .zip download links
Will reliably identify malicious repos.
My original write-up: https://brennan.day/the-curious-case-of-the-triton-malware-fork/
Includes detailed analysis of one sample, file hashes, network IOCs, and discussion of the broader GitHub security crisis.
Please help document this.