×

GPUGate Malware Leverages Legitimate Platforms to Deliver Advanced Payloads

A sophisticated new malware campaign exploiting trusted platforms and hardware-dependent evasion techniques targets IT professionals across Western Europe.

Cybersecurity researchers have uncovered a highly sophisticated malware distribution campaign that cleverly exploits Google Ads and GitHub’s infrastructure to deliver a novel payload dubbed “GPUGate.”

The campaign, first identified by Arctic Wolf’s Cybersecurity Operations Center on August 19, 2025, represents a significant evolution in malware evasion techniques, using Graphics Processing Unit (GPU) requirements to bypass traditional security analysis environments.

Malicious Google Ad created by threat actors shown in the “Sponsored” ad position, at the top of real Google search results.
Malicious Google Ad created by threat actors shown in the “Sponsored” ad position, at the top of real Google search results.

The attack begins with a carefully orchestrated malvertising scheme where threat actors purchase Google Ads that appear at the top of search results when users search for “GitHub Desktop.”

These sponsored advertisements mimic legitimate GitHub branding and direct users to what appears to be an official GitHub repository page.

However, the attackers have ingeniously manipulated GitHub’s commit structure to create their deception.

Rather than hosting a completely fake website, the criminals create specific commits within legitimate GitHub repositories, modifying README files to include malicious download links.

By using commit-specific URLs, they can display pages that retain all the legitimate metadata of the original repository—including star counts, contributors, and repository names—while serving their malicious content.

The manipulation becomes nearly invisible to unsuspecting users. When victims click the malicious ads, they’re redirected to a specific commit view that bypasses GitHub’s warning banner through clever URL anchoring techniques.

Browser beware: Always hover your cursor over the blue underlined hyperlink and check the address bar in the lower left-hand corner.
Browser beware: Always hover your cursor over the blue underlined hyperlink and check the address bar in the lower left-hand corner.

The download links on these compromised pages redirect users to the attacker-controlled domain “gitpage[.]app” instead of GitHub’s official release infrastructure.

Revolutionary GPU-Gated Evasion

The malware payload itself represents a breakthrough in anti-analysis techniques. The initial installer, masquerading as “GitHubDesktopSetup-x64.exe,” is a bloated 128 MB Microsoft Software Installer (MSI) file designed to evade security sandbox limitations that typically restrict large file uploads.

The first stage is decrypted using XOR with key 0x5A. It launches code that generates a key for the second stage decryption of the payload.

Decryption Implementation.
Decryption Implementation.

The true innovation lies in GPUGate’s decryption mechanism. The malware employs an OpenCL kernel that performs cryptographic key generation exclusively on systems equipped with legitimate GPU hardware.

The decryption routine specifically checks GPU device name lengths—requiring names longer than 10 characters to proceed with payload decryption.

This hardware requirement effectively filters out virtual machines and analysis environments, which typically feature generic GPU names like “VMware SVGA” (10 characters exactly), while legitimate gaming or workstation GPUs carry longer names such as “NVIDIA GeForce RTX 4090” (25 characters).

Systems failing this check receive a fake decryption key, leaving the payload permanently encrypted and inert.

The campaign demonstrates remarkable scope, extending beyond Windows systems to target macOS users. The same infrastructure serves different variants of AMOS Stealer (also known as Atomic Stealer) depending on the processor architecture detected—Intel x64 or Apple ARM chips.

This cross-platform capability significantly expands the potential victim pool and demonstrates the operators’ sophisticated technical capabilities.

AMOS Stealer, first discovered in April 2023, functions as an information-stealing malware capable of harvesting keychain passwords, VPN profiles, browser credentials, cryptocurrency wallets, and instant messenger data.

The malware operates under a malware-as-a-service model, sold through underground forums and Telegram channels.

Targeting Strategy and Attribution

Intelligence analysis reveals the campaign specifically targets IT professionals across Western European nations, leveraging Google Ads categorized under “Computers and Consumer Electronics” to enhance legitimacy and visibility.

The strategic focus on technical professionals who regularly download development tools like GitHub Desktop represents a calculated approach to compromise high-value targets with elevated network privileges.

Attribution evidence points to Russian-speaking threat actors, evidenced by PowerShell script comments written in native Russian.

One notable comment, “Если не админ, запрашиваем один раз UAC и выходим,” translates to “If not admin, request UAC once and exit,” revealing the malware’s privilege escalation logic.

Once executed, GPUGate demonstrates sophisticated persistence techniques designed to maintain long-term access while avoiding detection.

The malware copies itself to the user’s %APPDATA% directory, creates scheduled tasks named “WinSvcUpd” to mimic legitimate Windows services, and systematically adds Windows Defender exclusions for critical directories.

The payload establishes command-and-control communication through multiple redundant domains and IP addresses across different hosting providers, ensuring operational continuity despite potential infrastructure takedowns.

The modular design enables operators to deploy additional payloads based on system characteristics and operational requirements.

Implications for Cybersecurity Defense

The GPUGate campaign fundamentally challenges traditional malware analysis methodologies.

By requiring specific hardware configurations for payload decryption, the technique renders standard sandbox environments ineffective and forces security researchers to deploy specialized infrastructure for investigation.

The campaign’s eight-month operational timeline, spanning from the December 2024 compilation date to active infrastructure observed in August 2025, demonstrates sustained capability and ongoing development cycles.

The exclusive targeting of Western European IT professionals represents a calculated risk-reward optimization, accepting reduced infection volumes in exchange for higher-value compromises with potential for supply chain attacks, credential theft, and lateral network movement.

The sophisticated abuse of trusted platforms like Google Ads and GitHub, combined with hardware-dependent evasion techniques, suggests this campaign may inspire broader adoption of similar methodologies across the threat landscape.

Organizations must adapt their security strategies to account for these evolving techniques that blur the lines between legitimate and malicious infrastructure usage.

As the campaign remains active at the time of this analysis, security teams should implement enhanced monitoring for unusual GPU-related processes, scrutinize download sources even from trusted platforms, and consider deploying analysis environments equipped with legitimate GPU hardware to combat this emerging evasion technique.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Post Comment