New Sophisticated Malware Campaign Uses Google Ads and GitHub to Target IT Firms

New Sophisticated Malware Campaign Uses Google Ads and GitHub to Target IT Firms
Cybersecurity researchers have uncovered a highly sophisticated malware campaign leveraging paid search ads on platforms like Google to deliver malicious payloads to unsuspecting users seeking popular tools such as GitHub Desktop. The campaign, active since at least December 2024, is specifically targeting IT and software development companies in Western Europe.

“Even when a link seems to point to a reputable platform such as GitHub, the underlying URL can be manipulated to resolve to a counterfeit site,” said Arctic Wolf in a report last week. The threat actors embed a GitHub commit into page URLs, which redirect users to attacker-controlled infrastructure, including a malicious download hosted on a lookalike domain called gitpage[.]app.

The first-stage malware is a 128 MB Microsoft Software Installer (MSI) that bypasses most security sandboxes due to its size. It employs a GPU-gated decryption routine, codenamed GPUGate, which keeps the payload encrypted on systems without a real GPU. “Systems without proper GPU drivers are likely to be virtual machines (VMs), sandboxes, or older analysis environments that security researchers commonly use,” Arctic Wolf explained. “The executable […] uses GPU functions to generate an encryption key for decrypting the payload, and it checks the GPU device name as it does this.” The malware also incorporates filler files to complicate analysis and terminates execution if GPU functions are unavailable or the device name is too short.

The attack sequence continues with a Visual Basic Script that launches a PowerShell script running with administrator privileges. This script adds Microsoft Defender exclusions, sets up scheduled tasks for persistence, and executes additional files extracted from a downloaded ZIP archive. The ultimate goal is information theft and delivery of secondary payloads, with evidence suggesting the attackers are Russian-speaking, based on Russian-language comments in the PowerShell script. Further investigation indicated a cross-platform approach, using the same infrastructure to stage the Atomic macOS Stealer (AMOS).

“By exploiting GitHub’s commit structure and leveraging Google Ads, threat actors can convincingly mimic legitimate software repositories and redirect users to malicious payloads – bypassing both user scrutiny and endpoint defenses,” Arctic Wolf noted.

The disclosure coincides with Acronis reporting the evolution of a trojanized ConnectWise ScreenConnect campaign targeting U.S. organizations since March 2025. This attack drops AsyncRAT, PureHVNC RAT, and a custom PowerShell-based RAT, executed via JavaScript downloaded from a cracked ScreenConnect server. “Attackers now use a ClickOnce runner installer for ScreenConnect, which lacks embedded configuration and instead fetches components at runtime,” the vendor said. “This evolution makes traditional static detection methods less effective and complicates prevention, leaving defenders with few reliable options.”

- Advertisement -

Disclaimer: The views expressed in this feature article are of the author. This is not meant to be an advisory to purchase or invest in products, services or solutions of a particular type or, those promoted and sold by a particular company, their legal subsidiary in India or their channel partners. No warranty or any other liability is either expressed or implied.
Reproduction or Copying in part or whole is not permitted unless approved by author.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch