Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign,
Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to deliver multi-stage malware.
« The malware enables data exfiltration (including credentials, browser data, and session tokens), remote access, and long-term persistence on infected systems, » Trend Micro researchers Jovit Samaniego, Aira Marcelo, Mohamed
« The malware enables data exfiltration (including credentials, browser data, and session tokens), remote access, and long-term persistence on infected systems, » Trend Micro researchers Jovit Samaniego, Aira Marcelo, Mohamed
,
Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to deliver multi-stage malware.
« The malware enables data exfiltration (including credentials, browser data, and session tokens), remote access, and long-term persistence on infected systems, » Trend Micro researchers Jovit Samaniego, Aira Marcelo, Mohamed
« The malware enables data exfiltration (including credentials, browser data, and session tokens), remote access, and long-term persistence on infected systems, » Trend Micro researchers Jovit Samaniego, Aira Marcelo, Mohamed
, ,
https://thehackernews.com/2025/06/water-curse-hijacks-76-github-accounts.html