OpenClaw Developer Targeted by GitHub Phishing Attack, Fake Airdrop Website Steals Wallet Funds

Gate News reports that on March 19, the security platform OX Security revealed that developers of the AI agent project OpenClaw are becoming targets of cryptocurrency phishing activities. Attackers created fake GitHub accounts, initiated issues in repositories they control, @-mentioned dozens of developers, claimed they had won a $5,000 CLAW token reward, and directed victims to a clone website nearly identical to openclaw.ai. This phishing site added a “Connect Wallet” button aimed at stealing connected wallet assets. Malicious code was hidden in deeply obfuscated JavaScript files, equipped with a “nuke” function to clear browser local storage data to hinder forensic analysis, and encoded wallet addresses, transaction amounts, and other information to send back to C2 servers. Researchers identified a suspicious crypto wallet address likely used to receive stolen funds. The related account was created last week and deleted within hours; no victims have been confirmed so far. Due to its high profile, OpenClaw has become a target for scammers, and its Discord community has previously experienced大量加密货币垃圾信息. Previously, the founder of OpenClaw warned users to beware of cryptocurrency scam emails impersonating OpenClaw.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
No comments