“These repositories also include distribution licenses and software screenshots to enhance their appearance of legitimacy,” McAfee concluded.