Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Russian APT 'ChainReaver' Hijacks 50 GitHub Accounts and
Russian APT 'ChainReaver' Hijacks 50 GitHub Accounts and
NEWS

Russian APT 'ChainReaver' Hijacks 50 GitHub Accounts and

A Russian state-sponsored APT group dubbed ChainReaver-L compromised trusted file-sharing mirrors and 50 long-established GitHub accounts to distribute...

Dylan H.

News Desk

February 15, 2026
3 min read

Massive Cross-Platform Supply Chain Attack

A Russian state-sponsored APT group dubbed ChainReaver-L has executed one of the most sophisticated supply chain attacks of 2026, compromising trusted file-sharing mirror sites and 50 long-established GitHub accounts to distribute infostealer malware targeting Windows, macOS, and iOS platforms simultaneously.

The attack infrastructure spans over 100 domains and leverages the inherent trust users place in established software distribution channels.


Attack Overview

FieldDetails
Threat ActorRU-APT-ChainReaver-L
AttributionRussian state-sponsored
Platforms TargetedWindows, macOS, iOS
GitHub Accounts Compromised50 (hijacked November 2025)
Mirror Sites CompromisedMirrored.to, Mirrorace.org
Infrastructure100+ attacker-controlled domains
Malware FamiliesMacSync Stealer, Windows infostealer, iOS phishing VPN apps

Platform-Specific Attack Chains

Windows

1. User downloads software from compromised mirror or GitHub
2. Password-protected archive delivered via MediaFire/Dropbox
3. Archive contains signed malware binary
4. Infostealer harvests browser credentials, crypto wallets, SSH keys
5. Data exfiltrated to C2 infrastructure

The Windows payloads use legitimate code-signing certificates to bypass SmartScreen and antivirus detections.

macOS

1. User encounters ClickFix-style social engineering lure
2. Lure tricks user into opening Terminal
3. Terminal command installs "MacSync Stealer"
4. Stealer targets Keychain, browser data, crypto wallets
5. Exfiltration via encrypted channels

The macOS attack reuses the ClickFix technique — presenting fake error dialogs that instruct users to paste commands into Terminal.

iOS

1. User directed to fraudulent VPN app on App Store
2. App passes initial App Store review via delayed payload
3. VPN app launches in-app phishing for Apple ID credentials
4. Stolen credentials used for account takeover

GitHub Account Hijacking

The 50 compromised GitHub accounts were mostly hijacked in November 2025 through a combination of:

  • Credential stuffing using data from previous breaches
  • Session token theft via browser infostealer malware
  • Phishing campaigns targeting developers with fake GitHub notification emails

The hijacked accounts were specifically chosen because they:

  • Had years of legitimate activity (establishing trust)
  • Maintained popular repositories with existing star counts
  • Were associated with verified developer identities

Malicious code was injected into existing releases and new repositories were created under trusted account names.


Indicators of Compromise

Network Indicators

Organizations should block and monitor for connections to:

  • Mirrored.to and Mirrorace.org (compromised mirrors)
  • MediaFire and Dropbox links distributing password-protected archives
  • The 100+ domains identified in the ChainReaver infrastructure

Endpoint Indicators

  • Windows: Look for recently installed binaries with unusual code-signing certificates
  • macOS: Check for MacSync processes or LaunchAgents
  • iOS: Audit installed VPN applications for unknown publishers

Recommendations

  1. Audit software sources — Verify all recent downloads from GitHub and mirror sites against known-good hashes
  2. Review GitHub dependencies — Check if any project dependencies use repositories from the compromised accounts
  3. Enable GitHub commit signing — Require GPG-signed commits to detect unauthorized changes
  4. Block mirror sites — Consider blocking file-sharing mirror sites at the network perimeter
  5. macOS hardening — Disable Terminal execution from browser-initiated prompts
  6. iOS audit — Review all installed VPN applications and remove any from unknown publishers

Sources

  • CyberPress — RU-APT-ChainReaver-L Supply Chain Attack
  • GBHackers — RU-APT-ChainReaver Hijacks Trusted Sites and GitHub
  • Cybersecurity News — ChainReaver-L Hijacks Trusted Websites and GitHub Repos
#Supply Chain Attack#Russia#APT#GitHub#macOS#Infostealer#ChainReaver

Related Articles

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

A newly observed ClickFix campaign impersonates Cloudflare's CAPTCHA verification pages to deliver the Python-based Infiniti Stealer to macOS users via a multi-stage chain involving a Bash script and a Nuitka-compiled loader.

4 min read

Claude AI Artifacts Abused to Distribute macOS Infostealer

Threat actors are abusing publicly shared Claude AI artifacts and Google Ads to deliver the MacSync infostealer to macOS users through ClickFix social...

3 min read

All Four Major Nation-State Adversaries Now Weaponizing

Google reports that APT groups from China, Russia, Iran, and North Korea are all actively using Gemini AI for cyber operations including target...

3 min read
Back to all News