When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
The payload, however, always remains the same.
These repositories also include distribution licenses and software screenshots to enhance their appearance of legitimacy, McAfee concluded.
The attackers said that antivirus solutions flag these programs as false-positives, and can safely be ignored.