Bitcoin thief uses fake GitHub jobs to steal$ 456K in Bitcoin cards.

Feb 25, 2025Ravie LakshmananGaming / Threat Intelligence

Researchers studying cybersecurity are calling attention to a current promotion that purports to target players and cryptocurrency traders using the pretext of open-source tasks hosted on Git Hub.

The battle, which spans hundreds of libraries, has been GitVenom by Kaspersky.

The Russian security merchant described the infected projects as” a remote management tool for Bitcoin wallets, a Telegram bot for Instagram accounts, and a Valorant game crack tool.”

” All of this alleged task functionality was false, and cybercriminals behind the campaign allegedly stole banking and personal information and forged cryptowallet addresses from the clipboard.”

The malicious action has facilitated the theft of 5 bitcoin, about fair$ 456, 600 as of writing. Some of the false assignments that were published are thought to have been in existence for at least two years. A majority of the disease attempts have been recorded in Russia, Brazil, and Turkey.

The jobs in issue are written in various programming languages, including Python, JavaScript, C, C++, and C#. The ultimate goal is, however, to create an integrated harmful payload that will retrieve additional components from an attacker-controlled GitHub repository and execute them, regardless of the language being used.

A Node is popular among these components. java data stealer that collects passwords, bank account information, saved certificates, bitcoin wallet data, and web browsing history, compresses them into a.7z library, and exfiltrates it to the threat actors via Telegram.

Remote management tools like and Quasar Mouse, which can be used to capture sick hosts, and a cutter malware that can replace wallet addresses copied into clipboard with an adversary-owned wallet in order to divert digital assets to the threat actors, are also available via the fictitious GitHub projects.

Concern actors will undoubtedly continue to use fake application as an illness lure in the future, according to Kaspersky researcher Georgy Kucherin, as code-sharing platforms like GitHub are used by millions of developers around the world.

” For that reason, it is crucial to control control of third-party code pretty thoroughly. It is crucial to carefully check the actions that quite code is performing before attempting to run it or incorporate it into an existing project.

The development comes as Bitdefender discovers that scammers are taking advantage of significant e-sports competitions like IEM Katowice 2025 and PGL Cluj-Napoca 2025 to target Counter-Strike 2 ( CS2 ) players with the intention of defrauding them.

Cybercriminals are luring fans into phony CS2 body giveaways that result in stolen Steam accounts, crypto fraud, and the loss of priceless in-game items by hijacked YouTube accounts to deceive professional players like s1mple, NiKo, and donk, according to the Italian security company.

Found this article interesting? Follow us on and Twitter to access more exclusive content.

Leave a Comment