Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

The Curious Case of the Triton Malware Fork

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 15:26:26 UTC)
Source: AlienVault OTX General

Description

A malicious fork of the MacOS app Triton was discovered on GitHub, containing Windows-targeted malware disguised as the legitimate application. The attacker altered the repository to redirect download links to a ZIP file hosting the malware. The malware exhibits sophisticated evasion and anti-analysis techniques, along with potential cryptocurrency-related functionality. Detection rates are low, and the unusual implementation suggests either an amateur effort or a possible AI-generated attack. This incident raises concerns about the security of code hosting platforms like GitHub and the prioritization of security by Microsoft. No known exploits in the wild have been reported yet. Indicators include malicious hashes, an IP address, and a suspicious domain. Organizations should be cautious when downloading software from public repositories and consider alternative platforms that better align with security and privacy values.

AI-Powered Analysis

AILast updated: 02/19/2026, 18:17:25 UTC

Technical Analysis

The threat involves a malicious fork of the Triton application originally targeting MacOS, discovered on GitHub. This fork, however, contains Windows-targeted malware disguised as the legitimate Triton app. The attacker modified the original repository by redirecting download links to a ZIP archive hosting the malware payload. Technical analysis reveals the malware employs advanced evasion techniques, including anti-analysis features designed to hinder detection and forensic investigation. Additionally, the malware may include cryptocurrency-related functionality, possibly for mining or theft. The low detection rate by antivirus engines and peculiar coding style suggest the malware could be an amateur attempt or potentially generated by AI tools, indicating evolving threat actor tactics. The incident highlights broader security concerns about the integrity and trustworthiness of code hosting platforms like GitHub, especially given Microsoft's ownership and security priorities. The malware uses multiple tactics and techniques referenced by MITRE ATT&CK IDs such as T1082 (System Information Discovery), T1071 (Application Layer Protocol), T1140 (Deobfuscate/Decode Files or Information), T1562 (Impair Defenses), T1090 (Proxy), T1059 (Command and Scripting Interpreter), T1497 (Virtualization/Sandbox Evasion), T1057 (Process Discovery), T1573 (Encrypted Channel), and T1012 (Query Registry). Indicators of compromise include specific file hashes, an IP address (89.169.12.160), a suspicious URL, and a domain (omg.lol). No CVE or known threat actor attribution is available, and no exploits in the wild have been reported to date.

Potential Impact

If deployed successfully, this malware could compromise Windows systems by masquerading as a legitimate MacOS application, potentially leading to unauthorized access, data exfiltration, or cryptocurrency theft. The sophisticated evasion techniques reduce the likelihood of detection by traditional security tools, increasing dwell time and risk of damage. Organizations relying on open-source software from public repositories may be exposed to supply chain risks, as attackers can manipulate popular projects to distribute malware. The incident undermines trust in widely used code hosting platforms, potentially affecting software development workflows globally. While no known exploits in the wild have been reported, the presence of cryptocurrency functionality could lead to resource abuse and financial losses. The malware’s ability to evade sandbox and forensic analysis complicates incident response and remediation efforts. Overall, the threat poses a medium risk but could escalate if attackers improve sophistication or target high-value organizations.

Mitigation Recommendations

1. Verify software authenticity by checking official sources and cryptographic signatures before downloading or installing applications from public repositories. 2. Implement strict code review and repository monitoring policies to detect unauthorized changes or forks, especially for critical open-source projects. 3. Employ advanced endpoint detection and response (EDR) solutions capable of identifying evasion and anti-analysis techniques. 4. Use network monitoring to detect suspicious outbound connections, especially to known malicious IPs or domains such as 89.169.12.160 and omg.lol. 5. Educate developers and users about the risks of downloading software from untrusted forks or repositories and encourage use of vetted package managers. 6. Consider adopting alternative code hosting platforms with stronger security controls and privacy commitments if GitHub’s security posture is a concern. 7. Regularly update antivirus and anti-malware signatures and heuristics to improve detection of emerging threats. 8. Employ sandboxing and behavioral analysis tools to detect malware that uses obfuscation and anti-analysis techniques. 9. Monitor for indicators of compromise (IOCs) such as the provided hashes and URLs to quickly identify potential infections. 10. Establish incident response plans that include supply chain attack scenarios and ensure rapid containment and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://brennan.day/the-curious-case-of-the-triton-malware-fork"]
Adversary
null
Pulse Id
69972ba2882e7d9de0dc29f9
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashf1656a8c3abfcbd368424f9eda42c172
hashd2891f7c71af662e10477d737aefcac4b8feffc3
hash39b29c38c03868854fb972e7b18f22c2c76520cfb6edf46ba5a5618f74943eac

Ip

ValueDescriptionCopy
ip89.169.12.160

Url

ValueDescriptionCopy
urlhttp://89.169.12.160/api/NTEsN2QsN2UsNTgsNWIsNjAsNjIsNjcsYyw3OSw=

Domain

ValueDescriptionCopy
domainomg.lol

Threat ID: 69974fe8d7880ec89b065bcc

Added to database: 2/19/2026, 6:01:12 PM

Last enriched: 2/19/2026, 6:17:25 PM

Last updated: 2/19/2026, 8:52:05 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats