Malicious actors are increasingly using public services like GitHub to host malware, enabling them to bypass detection tools. Threat research team ReversingLabs identified two novel techniques being used on GitHub. The first exploits GitHub Gists to host two-stage malicious payloads, while the second issues commands through git commit messages. Using GitHub for command and control (C2) infrastructure allows attackers to communicate with infected computers without arousing suspicion.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some