Fake GitHub Projects Fuel Crypto Thefts: Kaspersky

February 26, 2025
Fake GitHub Projects Fuel Crypto Thefts: Kaspersky

Cryptocurrency wallets are being drained through a network of fake GitHub projects, Kaspersky reports, as a sophisticated malware campaign targets developers with deceptively legitimate-looking code.

The malware campaign, dubbed “GitVenom” by the cybersecurity firm Kaspersky, involved the creation of over 200 fraudulent repositories on GitHub, a popular platform for sharing and collaborating on code. These repositories, masquerading as helpful tools for developers, contained malicious code designed to steal cryptocurrency and sensitive information. 

The fake projects spanned a range of purported functionalities, including Telegram bots for managing Bitcoin wallets, Instagram automation tools, and even utilities for the video game Valorant. While these projects seemed harmless at first glance, their true purpose was far more malicious.

Fake GitHub Projects: A Convincing Facade

Kaspersky analyst Georgy Kucherin highlighted the lengths to which the attackers went to make their projects appear genuine. The repositories featured well-crafted documentation, possibly generated with the assistance of AI tools, and an artificially inflated number of “commits” (changes to the code) to simulate active development. This created a convincing illusion of legitimacy, even for experienced developers.

“Clearly, in designing these fake projects, the actors went to great lengths to make the repositories appear legitimate to potential targets,” Kucherin stated in a recently released report.

However, despite their convincing appearance, the fake projects did not deliver on their promised functionality. Instead, Kaspersky’s investigation revealed that they contained “malicious payloads.” These payloads downloaded various harmful components onto victims’ computers.

Fake GitHub Projects Fuel Crypto Thefts: Kaspersky
credit: Kaspersky

Stealing Credentials and Hijacking Transactions

The downloaded malware included information stealers capable of collecting usernames, passwords, cryptocurrency wallet data, and browsing history. This stolen data was then transmitted to the attackers through the messaging platform Telegram.

Another crucial component of the attack was a clipboard hijacker. This type of malware monitors the user’s clipboard for cryptocurrency wallet addresses. When a user copied a legitimate wallet address to make a transaction, the hijacker would stealthily replace it with an address controlled by the attackers, diverting the funds.

The Rise of Fake GitHub Projects in Crypto Scams

The GitVenom campaign, which Kaspersky believes has been active for at least two years, has resulted in significant financial losses. The cybersecurity firm identified at least one instance where a victim lost 5 Bitcoin, equivalent to approximately $442,000 at the time of the theft. 

Fake GitHub Projects Fuel Crypto Thefts: Kaspersky
credit: Structure of a Malicious Code Repository Example/securelist

While the campaign has been observed globally, Kaspersky noted a higher concentration of infections in Russia, Brazil, and Turkey. This underlines a growing trend of using seemingly legitimate platforms for malicious purposes within the cryptocurrency space.

Protecting Against the Threat

Kucherin emphasized the importance of vigilance for developers and anyone using code-sharing platforms like GitHub. He advised users to thoroughly examine any third-party code before downloading or integrating it into their projects.

“The only question is how they’ll do it,” Kucherin warned, referring to future attacks. “Therefore, every developer should maintain their cybersecurity hygiene when working with GitHub.”

Kaspersky’s recommendations include using robust malware protection, scrutinizing less obvious indicators like contributor account creation dates, and avoiding direct download links from unverified sources. Reporting suspicious repositories to GitHub can also help prevent further infections. The firm anticipates that attackers will continue to exploit code-sharing platforms, underscoring the need for ongoing caution in the open-source software ecosystem.

Read More

Yona has no crypto positions and does not hold any crypto assets. This article is provided for informational purposes only and should not be construed as financial advice. The Shib Daily is an official media and publication of the Shiba Inu cryptocurrency project. Readers are encouraged to conduct their own research and consult with a qualified financial adviser before making any investment decisions.

Leave a Reply

Your email address will not be published.