Massive GitHub malware operation spreads BoryptGrab stealer


Massive GitHub malware operation spreads BoryptGrab stealer

Pierluigi Paganini
March 08, 2026

Trend Micro found BoryptGrab stealer spreading through 100+ GitHub repositories, stealing browser data, crypto wallets, system information, and user files.

Trend Micro uncovered a campaign distributing the BoryptGrab information stealer through more than 100 GitHub repositories.

BoryptGrab is designed to collect browser and cryptocurrency wallet data, system details, and common files. Some variants also deploy a PyInstaller backdoor called TunnesshClient, which creates a reverse SSH tunnel to communicate with attackers.

The malware is distributed via ZIP archives posing as software tools and game cheats, linked to over 100 GitHub repositories.

“By tracing the infection chain, we were able to observe several ZIP archive files in the wild (all with similar naming conventions) that masquerade as common software tools (including gaming cheat hacks).” reads the report published by Trend Micro. “As the “github-io” patterns in some ZIP file names suggest, searching for the software tool patterns leads to over a hundred public Github repositories delivering malware.”

Evidence such as Russian-language comments and infrastructure suggests the threat actors may have a Russian origin.

Attackers spread the malware through public GitHub repositories that pose as free software tools, game cheats, or utilities.

They stuff README files with SEO keywords so search engines rank the malicious repositories near legitimate results. One example mimics a Voicemod Pro download page and links to a GitHub-hosted site that looks like a normal project directory.

The page contains Russian comments and redirects visitors through a chain of encoded URLs until it reaches a fake download page that generates a ZIP archive containing the malware. Many repositories reuse the same logic and sometimes send tracking data to the attackers.

The downloaded ZIP files launch the infection through several methods. In one route, an executable side-loads a malicious libcurl.dll that decrypts a hidden launcher payload.

The launcher downloads the BoryptGrab information stealer and may also retrieve other payloads, including Vidar variants, a PyInstaller backdoor called TunnesshClient, and a Golang downloader named HeaconLoad. The launcher uses build names such as Shrek, Leon, or CryptoByte to request specific payloads and sets scheduled tasks to keep the malware running.

“Some launcher payload variants contain build names (with some differing from each other) . The launcher payload passes the build name as the “-b” argument when executing the BoryptGrab stealer it downloads.” continue the report.

Another infection path uses a VBS downloader that hides commands inside integer arrays. The script decodes PowerShell commands, downloads a launcher from a remote server, and can even add Microsoft Defender exclusions to avoid detection. That launcher then retrieves the BoryptGrab stealer and other tools from the attacker’s infrastructure.

In some variants, a .NET loader or embedded scripts trigger the same process, while others include the HeaconLoad downloader directly. HeaconLoad maintains persistence with registry entries and scheduled tasks, sends system information to a command-and-control server, and downloads additional bundles when available.

Several payloads rely on obfuscation techniques such as XOR-encrypted strings, dynamic API resolution, and code injection. Russian-language comments and log messages appear throughout the infrastructure and malware samples, suggesting the operators likely have a Russian background.

BoryptGrab is a C/C++ information stealer designed to collect large amounts of sensitive data from infected systems. The malware accepts optional command-line arguments such as –output-path to define where stolen data will be stored and –build-name to tag collected information. If attackers do not provide a build name, the malware uses a default value or relies on hardcoded identifiers such as CryptoByte, Shrek, Sonic, or Yaropolk, which help operators track infections.

Before collecting data, BoryptGrab performs anti-analysis checks.

“BoryptGrab detects whether it is executed in a virtual machine environment by querying registry entries and checking VM-related files. As part of its anti-analysis check, BoryptGrab also compares the names of running processes against a predefined list. It also attempts to execute with elevated privilege.” continues the report. “When the “–output-path”/”-o” argument is not given, BoryptGrab formats a default output path name using the current time, public IP address, and country code. Later, a directory with this output path name is created to stage collected data.”

It searches for signs of virtual machines, scans running processes against a predefined list, and attempts to gain elevated privileges. If no output path is specified, it creates a directory using the current time, public IP address, and country code to store stolen data.

The stealer targets data from many browsers, including Chrome, Edge, Firefox, Opera, Brave, Vivaldi, and Yandex. It uses techniques from public GitHub tools designed to bypass Chrome’s App-Bound Encryption and decrypt stored browser credentials. The malware loads an encrypted internal payload that extracts saved passwords and records installed applications.

BoryptGrab also downloads a helper tool to assist with Chromium-based browser extraction. Beyond browser data, it steals information from numerous desktop cryptocurrency wallets such as Exodus, Electrum, Ledger Live, Atomic, Binance, Wasabi, and Trezor. It captures screenshots, gathers system details, and includes a “file grabber” module that collects files with specific extensions from common directories. The malware also extracts Telegram files, browser passwords, and in newer variants, Discord tokens.

After gathering the data, BoryptGrab compresses and uploads the archive to the attacker’s server. Some variants also download TunnesshClient, a PyInstaller backdoor that establishes a reverse SSH tunnel, allowing attackers to run commands, move files, and use the infected system as a proxy.

“The BoryptGrab campaign illustrates an evolving threat ecosystem targeting users through deceptive software downloads and fake GitHub repositories.” concludes the report.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Spotify aims to provide a consistent listening experience that uses minimal data. As a result, your audio quality might be less than ideal, especially if you’re using a pair of high-fidelity headphones or high-end speakers. Here’s how to fix that.

Switch audio streaming quality to Very High or Lossless

The default audio streaming quality in both the mobile and desktop Spotify apps is set to Automatic, which usually keeps the audio quality at Normal, which is only 96 Kbps. Even though Spotify uses the Ogg Vorbis codec, which is superior to MP3, OGG files exhibit slight (but noticeable) digital noise, poor bass detail, dull treble, and a narrow soundstage at 96 Kbps.

Even worse, Spotify is aggressive about adjusting the automatic bitrate. Even though 4G is more than fast enough to stream high-quality OGG files, even with a weak signal, Spotify may still drop the quality to Low, which has a bitrate of just 24 Kb/s. You will notice such a sharp drop in quality, even on a pair of bottom-of-the-barrel headphones.

To rectify this, open the Spotify app, tap your user image, open “Settings and privacy,” and tap the “Media Quality” menu. Once there, set Wi-Fi streaming quality and cellular streaming quality to “Very high” or “Lossless.”

I recommend setting cellular streaming quality to Very high and reserving Lossless for Wi-Fi, since lossless streaming is very data-intensive. One hour of streaming lossless files can take up to 1GB of data, as well as a good chunk of your phone’s storage, because Spotify caches files you’re frequently streaming. Besides, you’ll struggle to notice the difference unless you’re listening to music on a wired pair of high-end headphones or speakers; wireless connection just doesn’t have the bandwidth needed to convey the full fidelity of Spotify lossless audio.

You might opt for High quality if you have a capped data plan, but I recommend doing so only if you stream hours upon hours’ worth of music every single day over a cellular network. For instance, I burn through about 8 GB of data per month on average while streaming about two hours of very high-quality music over a cellular network each day.

Illustration of a headphone with various music icons around.


How Audio Compression Works and Why It Can Affect Your Music Quality

Feeling the squeeze when listening to your favorite song?

Set audio download quality to Very high or Lossless

If you tend to download songs and albums for offline listening, you should also set the audio download quality to “Very high” or “Lossless.” This setting is located just under the audio streaming quality section.

The audio download quality menu in Spotify's mobile app.

If you’ve got enough free storage on your phone, opt for the latter, but if you’d rather save storage space, set it to Very high. You’ll hardly hear the difference, but lossless files are about five times larger than the 320 Kb/s OGG files Spotify offers at its Very high quality setting, and they can quickly fill up your phone’s storage.

Adjust video streaming quality at your discretion

The last section of the Media quality menu is Video streaming quality. This sets the quality of video podcasts and music videos available for certain songs. Since I care about neither, I set it to “Very high” on Wi-Fi and “Normal” on cellular, but you should tweak the two options at your discretion because songs sound notably better at higher video streaming quality levels.

If you often watch videos over cellular and have unlimited data, feel free to toggle video quality to very high.

Make sure Data Saver mode is disabled

Even if your audio quality is set to Very high or Lossless, Spotify will switch to low-quality streaming if the app’s Data saver mode is enabled. This option is located in the Data saving and offline menu. Open the menu, then set it to “Always off,” or choose “Automatic” to have Spotify’s Data Saver mode kick in alongside your phone’s Data Saver mode.

You can also enable volume normalization and play around with the built-in equalizer

Spotify logo in the center of the screen with an equalizer in front. Credit: Lucas Gouveia / How-To Geek

Last but not least, there are two additional features you can play with to improve your listening experience. The first is volume normalization, which sets the same loudness for every track you’re listening to. This can be handy because different albums are mastered at different loudness levels, with newer music usually being louder.

Since I’m an album-oriented listener, I keep the option disabled. I can just play an album and set the audio volume accordingly, and I don’t really mind louder songs when listening to playlists, artists, or song radios.

But if you can’t stand one song being quiet and the next rattling the windows, visit the Playback menu, enable “Volume normalization,” and set it to “Quiet” or “Normal.” The “Loud” option can digitally compress files, and neither Spotify nor I recommend using it. This also happens with “Quiet” and “Normal,” since both adjust the decibel level of the master recording for each song, but the compression level is much lower and extremely hard to notice.

Before I end this, I should also mention that you can access the equalizer directly from the Spotify app, where you can fine-tune your music listening experience or pick one of the available equalizer presets. If your phone has a built-in equalizer, Spotify will open it; if it doesn’t, you can use Spotify’s. On my phone (a Samsung Galaxy S21 FE), I can only use One UI’s built-in equalizer.

To open the equalizer, open “Playback,” then hit the “Equalizer” button. Now you can equalize your audio to your heart’s content.


Adjusting just a few settings can have a drastic impact on your Spotify listening experience. If you aren’t satisfied with Spotify’s sound quality, make sure to adjust the audio before jumping ship. You should also check the sound quality settings from time to time, as Spotify can reset them during app updates.​​​​​​​

Three phones with a Spotify screen and the logo in the center.


These 8 Spotify Features Are My Favorite Hidden Gems

Look for these now.



Source link