The Shelby Strategy
The SHELBY malware family exploits GitHub for command-and-control operations, employing sophisticated techniques to evade detection. The malware consists of a loader (SHELBYLOADER) and a backdoor (SHELBYC2), both obfuscated using Obfuscar. SHELBYLOADER employs various sandbox detection methods and uses GitHub for initial registration and key retrieval. SHELBYC2 communicates with the attacker's infrastructure using GitHub API, allowing for file uploads, downloads, and command execution. The campaign targets Iraqi telecommunications and potentially UAE airports, utilizing highly targeted phishing emails. Despite its sophistication, the malware's design has a critical flaw: anyone with the embedded Personal Access Token can control infected machines, exposing a significant security vulnerability.
Pulse ID: 67ebfcac2fcbc0b80399f243
Pulse Link: https://otx.alienvault.com/pulse/67ebfcac2fcbc0b80399f243
Pulse Author: AlienVault
Created: 2025-04-01 14:48:12
Be advised, this data is unverified and should be considered preliminary. Always do further verification.