{"id":45522,"date":"2026-04-18T00:11:35","date_gmt":"2026-04-17T16:11:35","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/18\/new-cgrabber-and-direct-sys-malware-spread-through-github-zip-files\/"},"modified":"2026-04-18T00:11:35","modified_gmt":"2026-04-17T16:11:35","slug":"new-cgrabber-and-direct-sys-malware-spread-through-github-zip-files","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/18\/new-cgrabber-and-direct-sys-malware-spread-through-github-zip-files\/","title":{"rendered":"New CGrabber and Direct-Sys Malware Spread Through GitHub ZIP Files"},"content":{"rendered":"\n<p>Researchers at exposure management services provider Cyderes have discovered a clever new multi-stage <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/openssf-malware-slack-linux-foundation-figures\/\">malware campaign<\/a> that successfully bypasses antivirus software to drain data from unsuspecting users. The firm\u2019s research, shared with Hackread.com, reveals that the campaign relies on two brand-new malware families named Direct-Sys Loader and CGrabber Stealer.<\/p>\n<h3><strong>Malware Delivery via GitHub<\/strong><\/h3>\n<p>Cyderes\u2019 unit of elite cybersecurity researchers, Howler Cell Threat Research Team, found that the attack begins with <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/malicious-zip-files-windows-shortcuts-malware\/\">ZIP archives<\/a> distributed through GitHub user attachment links. One recurring filename discovered was <code>Eclipsyn.zip<\/code>. <\/p>\n<p>These archives contain a legitimate, Microsoft-signed program called <code>Launcher_x64.exe<\/code>.&nbsp; This trusted file is tricked into running a malicious component through <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/fake-claude-ai-installer-plugx-malware-windows-users\/\">DLL sideloading<\/a>, and the component is disguised as a dependency named <code>msys-crypto-3.dll<\/code>. In the next phase of the attack, the Direct-Sys Loader begins its work.<\/p>\n<p>The <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cyderes.com\/howler-cell\/direct-sys-loader-cgrabber-stealer-five-stage-malware-chain\">blog post <\/a>reveals that this loader runs a series of checks to see if it is being monitored before doing anything. It then searches for 67 different security tools and also checks for virtual environments like <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/maestro-toolkit-vmware-vm-escape-vulnerabilities\/\">VMware<\/a>, Hyper-V, or VirtualBox. <\/p>\n<p>If the loader detects a researcher\u2019s sandbox, it simply quits. As per researchers, the malware uses direct syscalls to communicate directly with the operating system kernel. This helps it remain undetected because it silently bypasses the usual security hooks that monitor for suspicious activity, making it a very effective tool for silent intrusion.<\/p>\n<h3><strong>CGrabber Data Theft<\/strong><\/h3>\n<p>After the loader confirms the system is undefended, it executes the final payload known as the CGrabber Stealer, which is responsible for stealing the data. And, it does a fairly good job by grabbing an enormous range of personal information across dozens of apps. <\/p>\n<p>CGrabber, reportedly, steals saved passwords, credit card info, and cookies from browsers like Chrome, Edge, Brave, and Firefox, and also targets private keys from over 150 crypto apps, including MetaMask, <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/npm-malware-atomic-exodus-wallets-hijack-crypto\/\">Exodus<\/a>, <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/coinbase-customer-info-stolen-bribed-overseas-agents\/\">Coinbase<\/a>, and Binance. <\/p>\n<p>Even communication tools are not spared as the stealer obtains data from Telegram, Discord, Steam, and VPN services like NordVPN and ProtonVPN. Additionally, the stealer performs a CIS check (regional location check), and if the device is located in a country within the Commonwealth of Independent States, it immediately shuts down. Researchers noted that this is a common tactic threat actors use to avoid alerting law enforcement in those specific regions.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<div>\n<figure><a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Hackers-Abuse-GitHub-to-Distribute-New-CGrabber-and-Direct-Sys-Malware.png\"><img loading=\"lazy\" decoding=\"async\" width=\"702\" height=\"563\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Hackers-Abuse-GitHub-to-Distribute-New-CGrabber-and-Direct-Sys-Malware.png\" style=\"width:637px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Hackers-Abuse-GitHub-to-Distribute-New-CGrabber-and-Direct-Sys-Malware.png 702w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Hackers-Abuse-GitHub-to-Distribute-New-CGrabber-and-Direct-Sys-Malware-300x241.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Hackers-Abuse-GitHub-to-Distribute-New-CGrabber-and-Direct-Sys-Malware-380x305.png 380w\" sizes=\"auto, (max-width: 702px) 100vw, 702px\" alt=\"New CGrabber and Direct-Sys Malware Spread Through GitHub ZIP Files\" \/><\/a><figcaption>Attack Overview (Source: Cyderes)<\/figcaption><\/figure>\n<\/p><\/div>\n<h3><strong>Advanced Evasion<\/strong><\/h3>\n<p>The level of discipline shown in this campaign is incredibly high, given that all stolen data is encrypted using the ChaCha20 algorithm before sending it to their servers. Because the malware uses custom web headers like X-Auth-Token, it can easily pass through network filters. <\/p>\n<p>This research into the new threat was shared exclusively with Hackread.com. The best way to stay safe is to be wary of any ZIP file from GitHub and to monitor your system for strange files appearing in folders you didn&#8217;t create.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"New CGrabber and Direct-Sys Malware Spread Through GitHub ZIP Files\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at exposure management services provider Cy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45522","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45522"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45522\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}