They could even have support pages that look real, by copying them from the legitimate site.
And the process of creating a repo that stays in sync with another fork can be automated, so, if needed, malware writers likely will do that.
reply