Hackers Exploit GitHub to Steal Crypto: Malware Hidden in Open Source

Cybercriminals have launched a stealthy malware campaign, Gitvenom, targeting developers on GitHub by embedding malicious code within fraudulent open-source projects.

The attack, recently exposed by Kaspersky researchers Georgy Kucherin and Joao Godinho, uses deceptive tactics to trick developers into unknowingly executing harmful scripts.

To enhance credibility, attackers:

  • Create fake repositories mimicking popular tools.

  • Use AI-generated README.md files to appear legitimate.

  • Artificially inflate commit histories and add multiple tags.

Once developers clone and execute the compromised code, malware deploys silently, leading to the theft of crypto wallet credentials and sensitive data.

How Gitvenom Infects Crypto Wallets

The Gitvenom campaign is highly sophisticated, tailoring its attack methods based on programming languages:

  • Python projects hide the payload in long whitespace gaps followed by a script decryption command.

  • JavaScript repositories use Base64-encoded scripts to execute malware.

  • C, C++, and C# projects embed batch scripts in Visual Studio files, triggering malware when compiled.

Once activated, the malware downloads additional payloads from an attacker-controlled GitHub repository. These include:

  • Node.js-based stealers – Extract credentials, browsing history, and crypto wallet data.

  • Remote access tools (RATs) – Deploy AsyncRAT and Quasar backdoor for full system control.

  • Clipboard hijackers – Modify copied crypto wallet addresses to divert funds to hacker-controlled wallets.

Global Impact and How to Stay Safe

The Gitvenom campaign has been active for at least two years, with widespread infection attempts recorded in Russia, Brazil, and Turkey. Given the increasing exploitation of open-source platforms, cybersecurity experts warn that developers must exercise extreme caution when using third-party code.

How to Protect Yourself:

  • Verify repository sources – Check for inconsistencies in commit history and contributors.

  • Manually review code – Inspect scripts before running them, especially those with obfuscated commands.

  • Use sandbox environments – Test untrusted code in isolated systems.

  • Enable multi-factor authentication (MFA) – Secure accounts linked to development tools.

As hackers continue exploiting GitHub’s open-source ecosystem, developers must adopt strict security measures to prevent crypto wallet theft and data breaches.

Check out our free forex signals
Follow the top economic events on FX Leaders economic calendar
Trade better, discover more Forex Trading Strategies
ABOUT THE AUTHOR See More
Arslan Butt
Index & Commodity Analyst
Arslan Butt serves as the Lead Commodities and Indices Analyst, bringing a wealth of expertise to the field. With an MBA in Behavioral Finance and active progress towards a Ph.D., Arslan possesses a deep understanding of market dynamics.His professional journey includes a significant role as a senior analyst at a leading brokerage firm, complementing his extensive experience as a market analyst and day trader. Adept in educating others, Arslan has a commendable track record as an instructor and public speaker.His incisive analyses, particularly within the realms of cryptocurrency and forex markets, are showcased across esteemed financial publications such as ForexCrunch, InsideBitcoins, and EconomyWatch, solidifying his reputation in the financial community.
Related Articles
Comments
0 0 votes
Article Rating
Subscribe
Notify of
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Add 3442

Add 3440