AI-assisted campaign floods GitHub with over 300 malicious repositories

April 13, 20262 min read1 sources
Share:
AI-assisted campaign floods GitHub with over 300 malicious repositories

Cybersecurity firm Checkmarx has uncovered a large-scale software supply chain attack on GitHub, dubbed "RepoStorm." The campaign, active since at least mid-May 2024, has leveraged artificial intelligence to create and promote over 300 malicious repositories designed to trick users into downloading information-stealing malware.

The threat actors created fake repositories that impersonated a wide range of assets, from developer tools and cracked software to cheats for popular games like Roblox, Fortnite, and Grand Theft Auto V. According to the Checkmarx report, AI was likely used to generate convincing repository names, detailed README files, and persuasive descriptions, allowing the campaign to operate at a significant scale. Users searching for these tools were lured into downloading ZIP archives that appeared legitimate.

These archives did not contain the promised software. Instead, they delivered well-known malware payloads, primarily information stealers such as Lumma, Vidar, and RedLine Stealer. Once executed, this malware is designed to harvest sensitive data from a victim's machine, including browser history, saved credentials, cookies, and cryptocurrency wallet information. In some instances, the repositories were also found to distribute Remote Access Trojans (RATs).

The campaign targets a broad audience, from individual developers and gamers to employees who might download these tools on corporate devices, creating a risk of business network compromise. The use of AI to generate plausible content makes it more difficult for users to distinguish malicious repositories from legitimate ones. Following the disclosure from Checkmarx, GitHub has reportedly removed most of the identified malicious repositories. Security professionals advise users to only download software from official, verified sources and to be highly skeptical of repositories offering cheats or pirated applications.

Share:

// SOURCES

// RELATED

OpenAI rotates security certificates after supply chain attack hits development pipeline

A malicious package impersonating 'axios' was executed in a GitHub Actions workflow, forcing OpenAI to rotate potentially exposed macOS code-signing k

2 min readApr 14

OpenAI issues Mac app update after developer tool hit by supply chain attack

OpenAI released a precautionary update for its macOS app after a developer tool used in its creation pulled a malicious version of a code library.

2 min readApr 14

Docker flaw lets attackers bypass authorization to gain host access

A high-severity flaw in Docker Engine, CVE-2026-34040, allows attackers to bypass security plugins and gain full access to host systems.

2 min readApr 13

North Korean hackers spread over 1,700 malicious packages across major code registries

A North Korea-linked campaign has published over 1,700 malicious packages in multiple code registries, targeting developers using a wide array of lang

2 min readApr 13