WebRAT Malware: How Hackers are Exploiting GitHub to Spread Info-Stealing Malware (2026)

The digital world is under attack! WebRAT, a malicious backdoor malware, is spreading its web of deceit, and this time, it's exploiting the trust of developers and security enthusiasts. But here's where it gets sneaky...

WebRAT has found a new way to infiltrate systems by masquerading as proof-of-concept vulnerability exploits on GitHub. These fake exploits are designed to lure unsuspecting users into downloading and executing the malware. Previously, WebRAT was distributed through pirated software and game cheats, targeting popular games like Roblox, Counter Strike, and Rust. However, its new strategy is a cause for concern.

The Deception Unveiled:
WebRAT pretends to offer solutions for recently disclosed vulnerabilities, such as CVE-2025-59295, CVE-2025-10294, and CVE-2025-59230. These vulnerabilities, reported in media outlets, are serious security flaws. For instance, CVE-2025-59295 allows arbitrary code execution in Windows MSHTML/Internet Explorer, while CVE-2025-10294 enables attackers to bypass authentication in WordPress plugins. And this is the part most people miss—the fake exploit files are crafted to appear legitimate, complete with detailed explanations and mitigation strategies, making them hard to distinguish from genuine security research.

Uncovering the Trickery:
Security researchers at Kaspersky uncovered 15 GitHub repositories distributing WebRAT. Interestingly, the content of these repositories is believed to have been generated using artificial intelligence, adding a layer of sophistication to the deception. The malware ensures its persistence through various methods, including modifying the Windows Registry, using the Task Scheduler, and injecting itself into random system directories.

The Lure and Its Payload:
The fake exploits are delivered in a password-protected ZIP file, containing cleverly disguised components. These include an empty file with the password as its name, a corrupted decoy DLL file, a batch file for execution, and the main dropper named rasmanesc.exe. Once executed, the dropper elevates privileges, disables Windows Defender, and downloads WebRAT from a predetermined URL.

A Familiar Tactic:
This is not the first time malicious actors have abused GitHub to spread malware. In the past, similar tactics have been used to distribute various types of malware, including Windows and Linux malware, and even targeted the infosec community with Cobalt Strike. More recently, a fake 'LDAPNightmare' exploit was promoted on GitHub to spread infostealer malware.

Staying Vigilant:
While Kaspersky has removed the malicious repositories related to this WebRAT campaign, it's crucial for developers and security enthusiasts to remain cautious. Threat actors can easily create new accounts and publish similar lures. The best practice when testing exploits or code from untrusted sources is to do so in a controlled, isolated environment.

And here's a thought: Could this be a wake-up call for the open-source community to enhance security measures and review processes? What steps can be taken to prevent such sophisticated deceptions in the future? Share your insights and let's spark a discussion on improving online security!

WebRAT Malware: How Hackers are Exploiting GitHub to Spread Info-Stealing Malware (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Arielle Torp

Last Updated:

Views: 5414

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.