Market News

GitVenom Malware: How Fake GitHub Projects Stole $456K in Bitcoin by Hijacking Wallets

cryptocurrency scams, Cybersecurity, gaming threats, GitVenom, malware prevention, open-source software, personal information theft

Cybersecurity experts have raised alarms about a campaign called GitVenom, which is preying on gamers and cryptocurrency enthusiasts by disguising malicious projects as legitimate open-source software on GitHub. This ongoing threat, active for over two years, involves hundreds of fake project repositories designed to steal personal and banking information, including hijacking cryptocurrency wallet addresses. Notably, these projects feature tools like Telegram bots for Bitcoin management and game crack tools. So far, attackers have stolen around 5 bitcoins, valued at over $450,000. Researchers emphasize the importance of scrutinizing third-party code to prevent falling victim to these threats, especially as cybercriminals exploit popular gaming events to target players.



Feb 25, 2025Ravie LakshmananGaming / Threat Intelligence

Cybersecurity experts are raising alarms about a new wave of cyberattacks targeting gamers and cryptocurrency enthusiasts. Dubbed GitVenom, this campaign uses fake open-source projects hosted on GitHub to lure victims into downloading malicious software.

The campaign has proliferated across hundreds of repositories, which look legitimate at first glance. These projects include tools claiming to enhance interaction with social media like Instagram, manage Bitcoin wallets, and even a cheat for the game Valorant. However, all of these projects are traps designed to compromise users’ personal and financial information.

As a result of this ongoing operation, attackers have reportedly stolen 5 bitcoins, currently valued at around $456,600. Most of these incidents have been traced back to countries like Russia, Brazil, and Turkey. The malicious software is written in various programming languages such as Python, JavaScript, and C++, all sharing a common goal: to deploy hidden payloads that could lead to the theft of sensitive data.

Among the theft tactics, the cybercriminals use an information-stealing tool that gathers passwords, banking details, and cryptocurrency wallet information. This data is compressed and sent back to the attackers through platforms like Telegram, making it easier for them to access stolen assets.

Unfortunately, the threat doesn’t stop there. The attackers also deploy advanced remote access tools that allow them to control infected devices. One particularly insidious method includes a type of malicious software, known as clipper malware, which replaces pasted wallet addresses with the attackers’ own, redirecting funds to them.

As coders around the world increasingly share projects on platforms like GitHub, it has become vital for users to scrutinize third-party code carefully. Kaspersky’s researcher Georgy Kucherin advises that anyone considering using open-source code should verify its legitimacy before running it.

This alarming trend comes as another report highlights scams targeting players wearing the popular game Counter-Strike 2. Cybercriminals are impersonating professional players and conducting fake giveaways, resulting in stolen game accounts and cryptocurrency theft. It’s a reminder of how important it is to remain vigilant in the gaming community.

In light of these developments, gamers and cryptocurrency users must be more aware than ever of potential threats. Always research software before downloading and manage your finances with caution.

What is GitVenom malware?
GitVenom is a type of malicious software that pretends to be helpful GitHub projects. It tricks users into downloading it to steal their Bitcoin wallets and other cryptocurrencies.

How does GitVenom steal Bitcoin?
GitVenom steals Bitcoin by deceiving users into installing fake GitHub projects. Once installed, it can access and hijack the users’ digital wallets.

What can I do to protect myself from GitVenom?
To stay safe from GitVenom, always check the source of software before downloading. Use official websites and be cautious of unknown links. Keep your antivirus software updated and use unique passwords for your wallets.

How much money did GitVenom steal?
GitVenom has been reported to have stolen around $456,000 in Bitcoin from unsuspecting users through its fake projects.

Who is behind the GitVenom malware?
The specific creators of GitVenom are not known. However, it is believed to be linked to cybercriminals looking to take advantage of cryptocurrency users.

Leave a Comment

DeFi Explained: Simple Guide Green Crypto and Sustainability China’s Stock Market Rally and Outlook The Future of NFTs The Rise of AI in Crypto
DeFi Explained: Simple Guide Green Crypto and Sustainability China’s Stock Market Rally and Outlook The Future of NFTs The Rise of AI in Crypto
DeFi Explained: Simple Guide Green Crypto and Sustainability China’s Stock Market Rally and Outlook The Future of NFTs The Rise of AI in Crypto