
A Malware-as-a-Service (MaaS) operation leveraged GitHub repositories as open directories for staging custom payloads. Attackers used the Emmenhtal loader to deliver Amadey, which downloaded other malware from fake GitHub repositories onto infected hosts.
According to the latest Cisco Talos analysis, MaaS operation deployed the same variant of Emmenhtal used in a Ukraine-focused SmokeLoader phishing campaign, both identified in February 2025.
In the other campaign, the attackers employed phishing emails with invoice-themed attachments to initiate attacks targeting Ukrainian entities.
The Emmenhtal loader (sometimes referred to as “PEAKLIGHT) is a multi-layer downloader designed to evade detection.
Amadey, originally spotted in 2018 on hacking forums, provides modular functionality. Once executed, the loader deployed Amadey, a well-known MaaS platform capable of downloading additional payloads such as credential harvesters and remote access tools.
Since the command and control (C2) infrastructures for the secondary payloads do not overlap with those of Amadey, it suggests that it distributes malware for other threat actors.
The operators created fake accounts to host malicious scripts and payloads, leveraging GitHub’s credibility to bypass web filters. Talos discovered three GitHub accounts used as open directories for hosting tools, secondary payloads, and Amadey plugins:
Hosting malware on GitHub allows seamless distribution via direct URLs, making detection challenging for standard security measures.
This MaaS operation highlights cybercriminals' evolving strategies to exploit legitimate platforms for malicious purposes. Modern cybersecurity defenses must prioritize behavioral analysis and incorporate real-time monitoring mechanisms to effectively counter these threats.
In 2024, the SmokeLoader malware attacked Taiwanese manufacturing, healthcare, and IT companies.