Executive Summary
In June 2024, cybersecurity researchers observed a campaign distributing the WebRAT infostealer through malicious GitHub repositories. Threat actors uploaded repositories pretending to offer proof-of-concept exploits for recent vulnerabilities, luring security professionals and researchers to download and execute the malware. Once installed, WebRAT exfiltrates sensitive information, leverages encrypted channels to evade detection, and can facilitate follow-on attacks via credential or data theft. This campaign underscores the risks in sourcing security tools or code from unverified public repositories and demonstrates the sophistication of modern software supply chain attacks.
The incident highlights the growing trend of cybercriminals abusing trusted platforms like GitHub to reach a wide audience. With infostealer malware evolving and developer-targeted attacks increasing, organizations must remain vigilant about supply chain security and implement controls to detect and block lateral movement or data exfiltration.
Why This Matters Now
This campaign demonstrates a rapid adaptation by threat actors, who weaponize the popularity of newly reported vulnerabilities and trusted developer platforms. With developers and organizations increasingly reliant on open-source code, the risk of inadvertently executing infostealers is acute, increasing urgency for security teams to implement robust code sourcing and egress threat controls.
Attack Path Analysis
Attackers enticed victims to download fake proof-of-concept exploits on GitHub, leading to WebRAT malware infection (Initial Compromise). The malware may have attempted to obtain higher privileges by exploiting vulnerabilities or abusing user permissions (Privilege Escalation). Once resident, WebRAT could move laterally within the compromised environment to identify valuable internal resources (Lateral Movement). The malware then established communication with attacker-controlled infrastructure for remote control (Command & Control). Collected credentials and sensitive data were exfiltrated via outbound channels (Exfiltration). The final impact involved credential theft and possible unauthorized access to other systems, potentially enabling further compromises (Impact).
Kill Chain Progression
Initial Compromise
Description
Victims were tricked into downloading and executing malicious payloads disguised as exploit proof-of-concepts from GitHub repositories, resulting in WebRAT infection.
Related CVEs
CVE-2025-59295
CVSS 8.8A heap-based buffer overflow vulnerability in Internet Explorer allows remote attackers to execute arbitrary code via crafted web content.
Affected Products:
Microsoft Internet Explorer – 11
Exploit Status:
proof of conceptCVE-2025-10294
CVSS 9.8An authentication bypass vulnerability in the OwnID Passwordless Login plugin for WordPress allows unauthenticated attackers to gain administrative access.
Affected Products:
OwnID Passwordless Login Plugin – < 1.2.0
Exploit Status:
proof of conceptCVE-2025-59230
CVSS 7.8A privilege escalation vulnerability in Windows Remote Access Connection Manager (RasMan) allows local attackers to gain SYSTEM privileges.
Affected Products:
Microsoft Windows – 10, 11
Exploit Status:
proof of concept
MITRE ATT&CK® Techniques
Drive-by Compromise
Spearphishing via Service
User Execution: Malicious Link
Command and Scripting Interpreter: Windows Command Shell
Archive Collected Data
Exfiltration Over C2 Channel
Obfuscated Files or Information
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Protect systems and networks from malicious software
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework—Detection and Response
Control ID: Article 10(2)
CISA Zero Trust Maturity Model 2.0 – Continuous Threat Protection for Applications
Control ID: Pillar: Applications; Capability: Threat Protection
NIS2 Directive – Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
High risk from WebRAT infostealer targeting GitHub repositories with fake exploits, compromising developer credentials and source code through malicious proof-of-concept downloads.
Computer/Network Security
Critical exposure as security researchers downloading fake vulnerability exploits from GitHub face WebRAT infections, potentially compromising threat intelligence and security tool development.
Financial Services
Significant risk from WebRAT credential theft targeting developers accessing financial systems, requiring enhanced egress security and zero trust segmentation for compliance protection.
Health Care / Life Sciences
Elevated threat as healthcare developers using compromised GitHub exploits face HIPAA violations through WebRAT data exfiltration and unauthorized system access attempts.
Sources
- WebRAT malware spread via fake vulnerability exploits on GitHubhttps://www.bleepingcomputer.com/news/security/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/Verified
- WebRAT Malware Campaign Targets Security Researchers via Fake CVE Exploit PoCs on GitHubhttps://www.rescana.com/post/webrat-malware-campaign-targets-security-researchers-via-fake-cve-exploit-pocs-on-githubVerified
- Webrat, disguised as exploits, is spreading via GitHubhttps://securelist.com/webrat-distributed-via-github/118555/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Implementing Zero Trust segmentation, east-west traffic controls, egress policy enforcement, and real-time threat detection would have substantially hindered or detected each phase of the WebRAT attack, reducing blast radius and likelihood of data theft. CNSF controls enforce least privilege, prevent lateral malware movement, monitor outbound data, and identify malware activity rapidly.
Control: Egress Security & Policy Enforcement
Mitigation: Outbound connections to untrusted repositories can be blocked or flagged.
Control: Zero Trust Segmentation
Mitigation: Microsegmentation and enforced least privilege contain privilege elevation paths.
Control: East-West Traffic Security
Mitigation: Suspicious internal movement is restricted and detected.
Control: Threat Detection & Anomaly Response
Mitigation: C2 traffic patterns are detected and alerted in real-time.
Control: Cloud Firewall (ACF)
Mitigation: Unapproved outbound transfers are blocked or logged.
Incident impact is rapidly contained and analyzed.
Impact at a Glance
Affected Business Functions
- Software Development
- Cybersecurity Research
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of sensitive credentials, including those for communication platforms (e.g., Discord, Telegram), gaming accounts (e.g., Steam), and cryptocurrency wallets. Additionally, unauthorized access to webcams and microphones may lead to privacy violations.
Recommended Actions
Key Takeaways & Next Steps
- • Deploy zero trust segmentation and strict least privilege policies to restrict malware movement.
- • Enforce robust egress filtering and FQDN-based controls to block untrusted external communication.
- • Implement real-time anomaly and threat detection to rapidly alert on C2 and exfiltration traffic.
- • Utilize centralized multicloud visibility for faster incident response and forensic detection.
- • Harden internal workloads and monitor east-west traffic to prevent lateral spread following compromise.



