Python Infostealer Uses GitHub Releases To Bypass Security Tools

Python Infostealer Uses GitHub Releases To Bypass Security Tools
A newly discovered cyberespionage campaign dubbed Operation HumanitarianBait is actively leveraging trusted developer platforms to deploy a stealthy Python-based infostealer.

Cyble Research and Intelligence Labs identified this sophisticated attack, which relies on social engineering to establish persistent and covert access to victim systems.

The threat actors initiate the infection through phishing emails containing a malicious Windows shortcut file hidden within a RAR archive.

To exploit contextual trust, the attackers disguise this shortcut file as a Russian humanitarian aid request form, strongly suggesting the campaign specifically targets Russian-speaking individuals or organizations.

Python Infostealer Abuses GitHub

The attack executes a multi-stage infection process deliberately designed to evade automated analysis and security scanners.

When a victim interacts with the malicious shortcut file, PowerShell extracts and executes self-obfuscated content directly in the system’s memory, this technique ensures the malware runs only when the original file is present, effectively bypassing traditional sandbox environments.

Infection chain (Source: cyble)
Infection chain (Source: cyble)

Following this initial access phase, the malware displays a decoy humanitarian aid document to the victim while silently building a self-contained Python environment in the background system folders.

To bypass network security tools, the threat actors retrieve the primary payload from GitHub Releases.

Storing the malicious Python implant on GitHub allows the download traffic to blend seamlessly with normal developer activity and legitimate software updates. The core implant is heavily obfuscated using PyArmor.

Obfuscated and de-obfuscated LNK file contents (Source: cyble)
Obfuscated and de-obfuscated LNK file contents (Source: cyble)

It operates as a fileless surveillance platform, executing without dropping traditional binary files onto the hard drive.

Once fully active, the infostealer extensively harvests sensitive data from the compromised machine.

The implant targets major web browsers to extract stored passwords and session cookies, logs keystrokes, monitors clipboard activity, and captures continuous desktop screenshots.

GitHub page (Source: cyble)
GitHub page (Source: cyble)

Furthermore, the malware exfiltrates local Telegram session directories, granting attackers unauthorized access to messaging accounts.

To ensure long-term control, the payload establishes persistence through a scheduled task named WindowsHelper.

It silently installs legitimate remote desktop applications such as TeamViewer or AnyDesk. This provides attackers with interactive remote access without generating a visible application window for the victim.

According to Cyble research, defending against Operation HumanitarianBait requires a combination of user vigilance and proactive endpoint monitoring.

Security teams should treat unsolicited compressed archives and shortcut files delivered via email with extreme caution, verifying the sender through trusted channels before interaction.

Enabling file extension visibility in Windows can help users identify malicious files disguised with misleading extensions.

Indicators of Compromise

Indicator TypeIndicatorDescription
SHA-2568a100cbdf79231e70cee2364ebd9a4433fda6b4de4929d705f26f7b68d6aeb79Initial LNK dropper file
SHA-2569be61c95056fd6b63565cf51a196f2615f5360c0a42e616b2a618473e9d60a21Dementyeva_Anna_Vasilyevna_zayavka_gumanitarnayapomosch.rar
SHA-256a5b782901829861a6f458db404e8ec1a99c65a48393525e681742bb2a5db454d module.pyw – packed Python stealer/RAT

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Python Infostealer Uses GitHub Releases To Bypass Security Tools appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading