Automatically translated.View original post

A new technique of malware on GitHub uses Payload slicing.

A new technique of malware was found on GitHub, using slicing Payload into multiple parts to bypass being detected.

Releasing malware or payload files to the victim's machine can be called a variety of ways, from downloading them straight down, hiding code in pictures, and this time another interesting technique.

According to a report by the Help Net Security website, Github's famous campaign to spread malware by impersonating a tool to focus attacks on developers, gamers, as well as a common group of people who find software to use it will release the image (Image) of the Docker software as part of the OpenClaw Assistant system. The composition of the Repo page of the fake software that the hackers behind it create is known to be created realistically, such as the README manual. Elaborately, more than 500 Contributor names have been packaged. There are more than 568 star-rated regular developers on GitHub. In addition, the Repo page itself has received a lot of stars.

When the research team looked deeper, it was discovered that many of the accounts that came to the star were created for this purpose, commonly known as Achole. These accounts, when they looked into it, found that apart from the stars, there was no activity on GitHub. And when they checked into the files for software installation, they found that there was a Trojan malware insert for data theft, or an Infostealer created on the basis of the LuaJIT language with a high ability to evade detection. The evasion strategy is also used by splitting Payload parts into 2 parts in a Component model consisting of

A file for running 1unc.exe that contains malware scripts in Lua.

The file for the Obfuscation detection system is named license.txt.

The research team revealed that when they analyzed two separate files, they would not find anything unusual. The two files would have to work together to make up a complete malware payload. After getting the complete malware, the malware would detect up to five different malware analytics as part of the Anti-Analysis system and use the Delayed Execution technique to evade confinement in the simulated environment (Sandbox). After that, the malware would start monitoring the area where the machine is located (Geolocation), saving the screen image on the machine. Screenshot, then send the data back to the control server (C2 or Command and Control) to wait for the next command.

In addition to the above capabilities, the research team also found that many of the same file formats appeared on other Repo, impersonating tools for developers of artificial intelligence tools, game cheating tools, bots for trading Kerrency scriptograms, etc. When examining many elements, the research team assumed that AI tools could be used to create or name fake files and create content on many of these Repo pages.

# Trending # Lemon 8 Howtoo # lemon 8 diary # github # freedomhack

16 hours agoEdited to

Related posts

It's no secret that Karol G just slayed the #Grammys #Glambot . #AwardsSeason
user6854050772614

user6854050772614

9 likes

Free SVG files for Cricut Design Space. If you’re dealing with crafter’s block, this website has tons of free SVG downloads to spark new project ideas for shirts, stickers, bookmarks, and more. Save this for your next Cricut project and start creating again 💕 #designinspo #creativeart
VlunaWorks

VlunaWorks

3 likes

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

39 likes

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

104 likes

ERROR ERROR ERROR ERROR ERROR
🔺️!!!Flashy!!!🔺️ Um guys... Something is definitely wrong with my tablet 😬😨 #rewritesonic #malware #sonicexe #sonicthehedgehog #sonicfanart
EmK & Fidgi

EmK & Fidgi

2 likes

If you’re staring at Cricut Design Space with zero ideas this is for you! This free SVG website is perfect when you need inspiration fast. Save & share with your crafty bestie 💖 #designinspo #creativeart #DesignProcess #cricutprojects #CricutTutorial
VlunaWorks

VlunaWorks

1 like

Elite Hacker Destroyed His Empire By Forgetting On
Bro, I really forgot to use a VPN 💀 #hacker #cybercrime #fail #tech #arrestedstupidly
arrestedstupidly

arrestedstupidly

1 like

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

This video has been sitting in my drafts since 2025. Not because it wasn’t good, but because I waited for “perfect.” Just the same way we take the perfect picture and over staring at it, opens up the imperfections in the photo🤣🤣🤣 Today, I realized the message in this video still matters: persona
Abby❤️💎

Abby❤️💎

1 like

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

549 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

A series I’ve wanted to do forever! As a cyber security expert and bridal makeup artist I hope to share cyber concepts in easy to understand makeup metaphors! Let me know in the comments what topics interest you 💕 #makeupandmalware #mascara #cybersecurity @Lancôme
Betsy H

Betsy H

3 likes

+it’s less than 80$✨❗️LINK for this item in my bio❗️
Details⬇️: This flip phone smartphone with a flip keyboard design, offering both the convenience of a traditional keypad and the functionality of a modern touchscreen device. With 4GB of internal storage, you'll have plenty of space for apps, photos, and more. The compact 3.5" displa
Atlas

Atlas

443 likes

#tvshow #thecapture
nicemovie💕💕

nicemovie💕💕

2 likes

#batman is not the world’s greatest detective in fact he’s like the latest detective to find the guild. The world’s greatest detective is #detectivechimp #dccomics
Dan!

Dan!

3 likes

Traveling full-time means your inbox, passwords, and wifi connections are CONSTANTLY at risk — and the scams are getting smarter every year. ✈️🔐 That’s why I use Bitdefender Premium Security to protect my devices from the biggest threats travelers face: • 💳 Credit card & payment fraud • 📧 Phis
MADISON BROOKS TRAVEL

MADISON BROOKS TRAVEL

0 likes

#fy #fyp #fypシ゚viral #horrorgame Just tired of getting jumped😭, go subscribe to my YT channel.
dis-MALware

dis-MALware

3 likes

Setting Spray is the makeup equivalent to mulifactor authentication and it’s a must have! Follow along to learn more about cybersecurity from a pro makeup artist and cyber expert 🤌🏻
Betsy H

Betsy H

1 like

Revelry in the Dark
#myheroacademia #mha #bokunoheroacademia #bnha #tokoyami
Malware X20

Malware X20

5 likes

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

263 likes

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

Oscar Esparza Hacker

Oscar Esparza Hacker

0 likes

How to Make a Dyson Sphere in Sandboxels
#dysonsphere #science #sciencegames #gaming #pixelart
R74n

R74n

7 likes

A Ben 10 gym audio for you. #fyp #gym #ben10 #ben10omniverse #audio
IzzyywiththeZ

IzzyywiththeZ

0 likes

A desktop computer screen displays Pinterest with an AdGuard pop-up showing 17 ads blocked on the current site and 45 total. The AdGuard menu offers options like statistics, manual blocking, and mobile device protection.
This image highlights AdGuard AdBlocker, showing its high rating (4.7 stars, 63.7K ratings) and 15 million users. It states AdGuard blocks ads, including video and pop-ups, to ensure fast and secure browsing.
The image details AdGuard's key features, including tracking blocked ads, manual blocking, a 'Report an issue' tool, and mobile integration for protecting devices from ads.
🌸 tired of chrome ads? try this!
‧°𐐪♡𐑂°‧₊ 🦋Tired of endless ads ruining your browsing? AdGuard is the ultimate ad blocker that removes all ads even on YouTube and Facebook while speeding up page loads and protecting your privacy. It’s lighter and faster than other blockers, stops malware, and even blocks crypto-jacking. This part
peachiesuga ♡

peachiesuga ♡

25 likes

📍USB Write Protected? Fix It Instantly
Seeing “The disk is write-protected” error on your USB drive? This quick guide shows how to remove write protection and regain full access to your files. Learn how to check the physical lock switch, use DiskPart commands, repair file system errors, and fix registry issues step by step. Many cases a
XanthusTechCore

XanthusTechCore

5 likes

This is the newest way people are getting hacked and if you use AI to answer your questions and give you advice, you need to watch this.Thanks to Huntress for reporting this Follow for more
Cybersecurity Girl

Cybersecurity Girl

15 likes

Hack Back! Companies aren’t just selling products. They’re selling you. But you don’t have to make it easy 🙃 #AI #privacy #data #cybersecurity
Cathy

Cathy

6 likes

External Hard Drive Showing Empty? How to Fix?
Plugged in your external hard drive but found it empty? Here are a few easy fixes you can try! If your files are lost, use AOMEI FastRecovery to bring them back. Giveaway license code: code.aomeitech.com Discount code: Special30OFF  #externalharddrive #recovery #harddrive #empty
SmoothTechie

SmoothTechie

1 like

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

148 likes

💚🖤 #fyp #fypシ #fypシ゚viral #foryoupage #inspire #in
💚🖤 #fyp #fypシ #fypシ゚viral #foryoupage #inspire #inspiration #goviral #motivation #motivate #dankvisionz
Lisa Marie 💚🖤

Lisa Marie 💚🖤

6 likes

✨ Stand out during the holidays with this combo!
Tonight's combo is one that will make you stand out. Key notes: Honey, vanilla, amber. With a light hint of tobacco. 💌 Brand: @TheTipsyGoatSoapCompany Honey Toffee 💌 Brand: @Jebouri | Arabian Perfumery honey amber 💌 Brand: @Guerlain Tobacco Honey #عطر #عطور #perfumetiktok #
✨it's malware✨

✨it's malware✨

1 like

Indiana Mish (meesh)

Indiana Mish (meesh)

0 likes

Malicious Android App
Cybercriminals are using fake ATT apps to distribute malware #cybersecurity #Android
Lemon8er

Lemon8er

0 likes

Ten easy ways to spot a scam
That's a great request! Let's simplify those scam-spotting tools down to the absolute basics, using language even a child can remember. Here are ten easy rules, like a checklist, for staying safe: The 10 Super-Simple Scam Rules | Rule | What to Look For | The Simple Tool | |---|---|---|
Dragonak1754

Dragonak1754

6 likes

Network Security
In today's interconnected world, network security is more crucial than ever. As technology advances, cyber threats are becoming increasingly sophisticated, putting your personal data and business at risk. In this video, we'll delve into the basics of network security, explaining what it is,
Olo_Bugenyi

Olo_Bugenyi

1 like

productivity apps on your mac!
Proton VPN for staying secure online and Grammarly for making sure I don’t send embarrassing emails literally two apps I use daily to stay productive without the stress. If you’re not using them yet, you’re missing out! #lemon8partner #lemon8creator #tech #apps #productivity
asmae🐸

asmae🐸

19 likes

#Ben10 #alienx #AlienHeroes #Omnitrix #CartoonNetwork PART 03
xwkdevinityemmajo

xwkdevinityemmajo

0 likes

See more