On February 17, 2026, a software supply chain attack was discovered on GitHub, leveraging a malicious fork of a legitimate open-source project to distribute malware. An attacker, using the GitHub account 'JaoAureliano,' created a deceptive clone of 'Triton,' a known macOS client for the omg.lol service. The malicious repository was designed to trick developers and users into downloading a trojanized ZIP file named Software_3.1.zip. In a classic bait-and-switch, the payload within the ZIP file was not the macOS application but malware targeting the Windows operating system. This attack demonstrates how threat actors exploit the trust and collaborative nature of open-source platforms to propagate their malware.
This attack is a clear example of typosquatting and brandjacking within the software supply chain. The threat actor's process was as follows:
Software_3.1.zip for convenience.This technique preys on users who prefer to download pre-built binaries rather than compiling from source, a common practice for many.
T1195.001 - Compromise Software Dependencies and Development Tools: This is a classic supply chain attack that compromises a software distribution channel (a GitHub repo).T1566 - Phishing: While not email-based, the deceptive GitHub repository acts as a phishing lure for developers.T1204.002 - Malicious File: The attack relies on the user downloading and executing the trojanized ZIP file.T1027 - Obfuscated Files or Information: The malware within the ZIP file was likely obfuscated to evade antivirus detection.The primary impact is the infection of Windows machines belonging to users who fell for the trap. The consequences depend on the nature of the delivered malware, which could be anything from an infostealer or a credential harvester to a ransomware dropper or a botnet agent. This type of attack also erodes trust in the open-source ecosystem, making developers and users more hesitant to use forked or less-known repositories. For the legitimate 'Triton' project, it can cause reputational damage through false association.
D3-FA - File Analysis.M1017 - User Training.D3-DA - Dynamic Analysis of software components.Educate developers on the dangers of using untrusted forks and downloading pre-compiled binaries.
Legitimate projects should sign their releases, and users should verify the signatures.
Endpoint protection to scan downloaded files and detect the embedded malware.
Mapped D3FEND Techniques:
To defend against trojanized downloads like the one in the malicious Triton fork, organizations should enforce automated File Analysis on all files downloaded from the internet, especially executables and archives like ZIP files. This can be implemented at the network edge via a secure web gateway or on the endpoint via an EDR solution. When a user downloads Software_3.1.zip, the security tool should automatically inspect the contents, perform static and dynamic analysis (sandboxing) on the embedded executable, and block it if it's identified as malicious. This prevents the user from ever being able to run the malware.
A strong mitigation against this type of supply chain attack is to build a corporate culture and policy around Service Binary Verification. This means that whenever possible, developers should not use pre-compiled binaries from unvetted sources. Instead, they should download the source code from the official project repository, review it, and compile it themselves. For critical software, organizations can maintain their own internal, vetted repository of open-source binaries. This practice, while more time-consuming, provides strong assurance that the executed code matches the public source code and has not been trojanized.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats