Hackers Exploit Fake GitHub Code to Steal Your Bitcoin, Warns Kaspersky

Understanding the Threat

In a recent report by Kaspersky, a warning has been issued to developers that the code they use from GitHub to create applications or fix bugs may actually be a gateway for hackers to steal their Bitcoin (BTC) and other cryptocurrency holdings. GitHub, a widely-used platform among developers, is especially popular for crypto-related projects where even a small application can generate significant revenue.

The Rise of the GitVenom Campaign

Kaspersky has identified an ongoing threat known as the “GitVenom” campaign, which has been active for over two years and is increasingly targeting unsuspecting users. This campaign involves inserting malicious code into fake projects hosted on GitHub, often disguised as legitimate software.

How the Attack Works

The attack typically begins with seemingly authentic GitHub projects, such as tools for managing Bitcoin wallets or creating Telegram bots. These projects often feature well-crafted README files—sometimes even generated by AI—to enhance their credibility. However, hidden within the code is a Trojan horse designed to execute harmful actions.

### Malicious Code Techniques

– **Python Projects**: In Python-based applications, attackers embed harmful scripts after an unusual sequence of 2,000 tab characters. This string acts as a cover, allowing the malicious code to remain obscured until it is decrypted and executed.

– **JavaScript Projects**: For JavaScript, the attackers insert a rogue function into the main file, which triggers the malicious payload upon execution.

Once the user runs the infected code, a series of harmful programs are activated. A Node.js stealer collects sensitive information such as passwords, crypto wallet details, and browsing history, which is then sent to the attackers via Telegram. Additionally, Remote Access Trojans (RATs) like AsyncRAT and Quasar can take control of the victim’s device, logging keystrokes and capturing screenshots.

### The Clipper Functionality

One particularly dangerous feature of the malware is a “clipper” that replaces copied wallet addresses with those of the hackers. In a notable case, one of these wallets amassed 5 BTC—approximately $485,000 at the time—within just one month.

### Geographic Impact and Evasion Tactics

While the GitVenom campaign has primarily affected users in Russia, Brazil, and Turkey, its impact is felt globally. The attackers maintain a low profile by mimicking ongoing development and employing varied coding strategies to avoid detection by antivirus software.

Protecting Yourself from the Threat

Given the rising threat from these types of attacks, it is crucial for users to take precautions. Here are some recommended steps:

– **Examine Code Thoroughly**: Always scrutinize any code before executing it on your system.
– **Verify Project Authenticity**: Check the legitimacy of the project and its developers.
– **Be Cautious of Polished READMEs**: Exercise skepticism toward overly polished README files or inconsistent commit histories, as these may indicate malicious intent.

### Looking Ahead

Researchers at Kaspersky anticipate that such attacks will persist, potentially evolving with minor changes in tactics, techniques, and procedures (TTPs). As the landscape of cybersecurity continues to shift, remaining vigilant is key to safeguarding your cryptocurrency assets.

662