{"id":941,"date":"2024-01-09T11:13:00","date_gmt":"2024-01-09T11:13:00","guid":{"rendered":"https:\/\/conscia.com\/ie\/?p=941"},"modified":"2025-09-23T11:17:04","modified_gmt":"2025-09-23T10:17:04","slug":"the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes","status":"publish","type":"post","link":"https:\/\/conscia.com\/ie\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/","title":{"rendered":"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes"},"content":{"rendered":"\n<p class=\" wp-block-paragraph\">In the evolving landscape of cybersecurity threats, GitHub, a popular collaborative coding and version control platform, has emerged as a new frontier for cybercriminals and advanced persistent threats (APTs). This article delves into the multifaceted ways GitHub is exploited for malicious infrastructure, the challenges posed to cybersecurity and effective strategies for mitigation.<\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"attachment_20707\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2024\/01\/breakdown-of-abused-github-1024x654.png\" alt=\"Figure 1 - Breakdown of abused GitHub services among samples sourced from Recorded Future\" class=\"wp-image-20707\"\/><figcaption class=\"wp-element-caption\">Figure 1 \u2013 Breakdown of abused GitHub services among samples sourced from Recorded Future.<\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-group  background-graphics--none has-gray-300-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\">Understanding the Threat<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\"><a href=\"https:\/\/github.com\/features\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub\u2019s services<\/a>, integral to numerous legitimate operations, are being hijacked for a wide range of malicious infrastructure schemes. Key abuses include payload delivery, dead drop resolving (DDR), full command-and-control (C2), and exfiltration. This exploitation, termed \u201cliving-off-trusted-sites\u201d (LOTS), enables adversaries to blend seamlessly into legitimate network traffic, bypass traditional security defenses, and complicate the tracking of upstream infrastructure and actor attribution.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">While GitHub offers a platform for efficient and collaborative development, it simultaneously presents a low-cost, high-uptime, and easily accessible medium for threat actors. However, it\u2019s not without drawbacks for them. GitHub\u2019s inherent limitations, like file size restrictions and heightened visibility into hosted infrastructure, pose challenges to malicious users.<\/p>\n<\/div>\n\n\n\n<figure class=\"wp-block-image\" id=\"attachment_20706\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2024\/01\/github-services-abused.png\" alt=\"Figure 2 \u2013 Graphic of GitHub services abused by malicious infrastructure\" class=\"wp-image-20706\"\/><figcaption class=\"wp-element-caption\">Figure 2 \u2013 Graphic of GitHub services abused by malicious infrastructure<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Payload Delivery \u2013 The Dominant Scheme<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Payload delivery emerges as the most prevalent infrastructure scheme, with its ease of implementation and alignment with GitHub\u2019s legitimate use cases. Yet, it risks unintended exposure, potentially revealing operational insights into threat actors\u2019 development capabilities, targets, and attack vectors.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">GitHub\u2019s use for DDR and full C2 implementations, though less common, presents significant concerns. DDR via GitHub poses minimal risk of data removal due to the platform\u2019s difficulty in discerning malicious intent behind posted addresses or strings. Full C2 schemes, albeit relatively rare, are predominantly linked to sophisticated APT activity, underscoring their potential impact.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Exfiltration and Other Malicious Uses<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">While GitHub is less commonly used for exfiltration than other schemes, its use in this regard cannot be overlooked. Additionally, GitHub services have been abused for various other malicious purposes, including hosting phishing operations and serving as an infection vector.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Mitigating the Threat<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">To combat GitHub abuse, a multi-faceted approach is required. This includes service-based strategies like flagging or blocking specific GitHub services and context-based strategies based on the specific needs of different corporate environments. Organizations should invest in understanding how GitHub is abused to develop sophisticated detection mechanisms and tailored threat hunting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\">Challenges in Detecting GitHub Abuse<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">Using platforms like GitHub for nefarious activities is a tactic to evade detection. Identifying such abuse within a specific environment depends on factors like the availability of logs, organizational structure, and risk tolerance. A tailored approach, combining multiple detection strategies, is necessary.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\">Context-Based Detection Approaches<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">This strategy is grounded in the understanding of specific organizational needs. If only certain departments should access GitHub services, any traffic from other parts not designated for this interaction is considered suspicious. For instance, if only the development team is authorized to access&nbsp;<a href=\"https:\/\/docs.github.com\/en\/rest\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub APIs<\/a>, traffic from different departments to these APIs may indicate malicious activity. Implementing this strategy requires detailed knowledge of the organizational environment, including a list of authorized users and network segments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\">Service-Based Detection Techniques<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">This approach focuses on identifying unnecessary GitHub services in a corporate setting. For instance, an organization using an internal Git Enterprise server might not need various external GitHub services. Similarly, for companies using self-hosted runners for job assignments and updates, certain GitHub hosts can be blocked or monitored. Understanding the organization\u2019s GitHub service usage is crucial for this strategy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\">Log-Based Detection Methods<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">Log-based detection involves analyzing interactions between systems and GitHub services. Suspicious connections can be identified through proxy and audit logs. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitoring specific Living-Off-the-Land binaries (LOLbins) like&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/certutil\" target=\"_blank\" rel=\"noreferrer noopener\"><em>certutil<\/em><\/a>&nbsp;or&nbsp;<em>wget<\/em>&nbsp;used to retrieve payloads from GitHub.<\/li>\n\n\n\n<li>Detecting non-browser executables that make DNS requests to GitHub domains.<\/li>\n\n\n\n<li>Creating detection rules for Git commands used in data exfiltration, such as \u201cremote,\u201d \u201cadd,\u201d or \u201cpush,\u201d especially involving non-corporate GitHub domains.<\/li>\n\n\n\n<li>Proxy logs can be used to detect specific URL patterns with executable file extensions.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Detection Based on LIS Combinations<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">Since malware often abuses multiple&nbsp;<a href=\"https:\/\/conscia.com\/blog\/how-cybercriminals-exploit-legitimate-internet-services-for-malicious-purposes\/\">LIS<\/a>, detecting combinations of these services can be effective. For instance, identifying traffic to GitHub Pages that redirect to other services like mock API services could indicate malicious activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\">Network-Based Detection<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">As GitHub is often used for payload delivery and DDR, monitoring network communications for connections to malicious infrastructure can be helpful. However, this approach might only identify infections after data exfiltration has occurred.<\/p>\n\n\n\n<h3 class=\"wp-block-heading  wp-block-paragraph\">Proactive Threat Hunting<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">Proactive hunting involves manual processes and can provide insights into threat actor behaviors. Techniques include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hunting via GitHub usernames, repositories, and organization names.<\/li>\n\n\n\n<li>Using website scanning tools to identify malware-hosting sites associated with GitHub.<\/li>\n\n\n\n<li>Analyzing GitHub commit history to uncover details about threat actors\u2019 attack vectors, motivations, and targets.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The Future Outlook<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">As the abuse of legitimate internet services like GitHub is anticipated to increase, both defenders and service providers must adapt. Effective mitigation strategies require advanced detection methods, more comprehensive visibility, and diverse detection angles. Moreover, shifts in security ownership are expected, with LIS potentially assuming more responsibility in combating abuse.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">The abuse of GitHub for malicious purposes underscores a critical challenge in cybersecurity: the exploitation of trusted, legitimate services. Addressing this not only requires advanced technological solutions but also a paradigm shift in how cybersecurity is approached, emphasizing proactive, intelligence-driven strategies to stay ahead of the threat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the evolving landscape of cybersecurity threats, GitHub, a popular collaborative coding and version control platform, has emerged as a new frontier for cybercriminals and advanced persistent threats (APTs). This article delves into the multifaceted ways GitHub is exploited for malicious infrastructure, the challenges posed to cybersecurity and effective strategies for mitigation. Understanding the Threat [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":942,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[9,22],"global_partners":[],"global_industries":[25],"global_business_outcome":[43],"global_types":[],"class_list":["post-941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-cybersecurity","global_solutions-threat-intelligence","global_industries-all-industries","global_business_outcome-security-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes - Conscia Ireland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes\" \/>\n<meta property=\"og:description\" content=\"In the evolving landscape of cybersecurity threats, GitHub, a popular collaborative coding and version control platform, has emerged as a new frontier for cybercriminals and advanced persistent threats (APTs). This article delves into the multifaceted ways GitHub is exploited for malicious infrastructure, the challenges posed to cybersecurity and effective strategies for mitigation. Understanding the Threat [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-09T11:13:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T10:17:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\"},\"headline\":\"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes\",\"datePublished\":\"2024-01-09T11:13:00+00:00\",\"dateModified\":\"2025-09-23T10:17:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/\"},\"wordCount\":901,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/\",\"url\":\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/\",\"name\":\"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg\",\"datePublished\":\"2024-01-09T11:13:00+00:00\",\"dateModified\":\"2025-09-23T10:17:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes - Conscia Ireland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/","og_locale":"en_US","og_type":"article","og_title":"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes","og_description":"In the evolving landscape of cybersecurity threats, GitHub, a popular collaborative coding and version control platform, has emerged as a new frontier for cybercriminals and advanced persistent threats (APTs). This article delves into the multifaceted ways GitHub is exploited for malicious infrastructure, the challenges posed to cybersecurity and effective strategies for mitigation. Understanding the Threat [&hellip;]","og_url":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/","og_site_name":"Conscia Ireland","article_published_time":"2024-01-09T11:13:00+00:00","article_modified_time":"2025-09-23T10:17:04+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e"},"headline":"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes","datePublished":"2024-01-09T11:13:00+00:00","dateModified":"2025-09-23T10:17:04+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/ie\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/"},"wordCount":901,"publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"image":{"@id":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/","url":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/","name":"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg","datePublished":"2024-01-09T11:13:00+00:00","dateModified":"2025-09-23T10:17:04+00:00","breadcrumb":{"@id":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#primaryimage","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=941"}],"version-history":[{"count":1,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/941\/revisions"}],"predecessor-version":[{"id":943,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/941\/revisions\/943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media\/942"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/categories?post=941"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=941"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=941"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=941"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=941"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}