The document on GitHub contains a step-by-step instruction on the decompilation of Electrum Pro. In addition to the fact that the new application clearly used a foreign brand without permission, its creators also launched the website electrum.com, very similar to the original page - electrum.org.
Recently Electrum team presented strong evidence of dishonesty of the developers of Electrum Pro. So, in a certain part of the code (lines 223-248 in electrumpro_keystore.py), a function was found for copying custom seed-phrases and sending them to the electrum.com.
Note that such cryptographic keys allow an application to access the contents of bitcoins-addresses, tied to specific purses. When sending seed phrases to electrum.com, site owners can use them to steal cryptocurrency from accounts.
According to the developers of Electrum, when creating or restoring a Electrum Pro a copy of the seed phrases is always automatically sent to electrum.com.
The developers noted that they analyzed only the binary files Electrumpro-4.0.2.dmg (macOS) and ElectrumPro-4.0.2-Standalone.zip (Windows), but with a certain degree of certainty it they assumed that the rest of the files for Windows are malicious.
Users who stored their funds with Electrum Pro are advised to transfer their coins to new wallets as soon as possible. At the same time, no reports of the theft of bitcoins with Electrum Pro have yet been reported.