Stop overpaying - start transferring money with Ogvio. Sign up, invite friends & grab Rewards now! 🎁
Hackers Use Fake GitHub Repositories to Steal Crypto in “GitVenom” Scam
Key Takeaways
- Hackers are using fake GitHub repositories to spread malware that steals crypto and login credentials;
- These fraudulent projects appear legitimate with AI-generated instructions and fake activity logs;
- Kaspersky warns that the GitVenom scam has been active for years and urges caution with third-party code.
Kaspersky, a cybersecurity firm, reported that hackers are using fake GitHub repositories to steal cryptocurrency and login credentials.
Kaspersky's investigation also revealed evidence that some of these repositories have been active for at least two years. The scam, known as "GitVenom", appears to have a higher concentration of victims in Russia, Brazil, and Turkey, though it has been observed worldwide.
Kaspersky researcher Georgy Kucherin revealed in a February 24 report that these fraudulent repositories pretend to offer useful tools, such as a Telegram bot for managing Bitcoin
Did you know?
Subscribe - We publish new crypto explainer videos every week!
What is a Rug Pull in Crypto? (Meaning + Examples)
Hackers included detailed descriptions and instructional files, which Kaspersky suspects may have been generated with artificial intelligence (AI). They also manipulated project activity by continuously updating a timestamp file, which made it look like the repository was actively maintained.
Kaspersky found that the advertised features were non-functional, and the files executed meaningless actions while running hidden malware in the background. Once installed, the malware extracted saved credentials, browsing history, and cryptocurrency wallet details, sending them to attackers through Telegram.
Another malicious component worked as a clipboard hijacker, which monitored copied wallet addresses and replaced them with the hacker’s own. This method allowed attackers to intercept cryptocurrency transactions without the victim noticing.
On February 5, Kaspersky researchers discovered malware hidden in app development tools used to create apps for Google Play and the Apple App Store. What damage could it cause? Read the full story.