- Content source
- https://gbhackers.com/github-desktop-repo/
More on:Threat actors have successfully exploited a design flaw in GitHub’s fork architecture to distribute malware disguised as the legitimate GitHub Desktop installer.
The attack chain begins with a deceptively simple but effective technique. Attackers create throwaway GitHub accounts and fork the official GitHub Desktop repository.
They then modify the download link in the README file to point to their malicious installer and commit the change.
Crucially, the commit hash becomes viewable under the official repository’s namespace appearing as github.com/desktop/desktop/tree/<commit_hash> despite the attacker having no direct write permissions to the official repository.
The attack, which research firm GMO Cybersecurity has been actively tracked since September 2025, leverages a technique called “repo squatting” to make malicious commits appear under official repository namespaces, deceiving users into downloading trojaned software.
Attackers Hijack GitHub Desktop Repo to Spread Malware via Official Installer
Threat actors have successfully exploited a design flaw in GitHub's fork architecture to distribute malware disguised as the legitimate GitHub Desktop installer.
gbhackers.com

