Malware Targets Developers on GitHub

Security researchers have uncovered a new malware campaign named “GitVenom,” which is targeting developers using code repositories on GitHub. The malware disguises itself as useful developer tools but contains hidden payloads designed to steal cryptocurrency wallet data and browser history.

According to cybersecurity firm Kaspersky, GitVenom operates as a clipboard hijacker, scanning victims’ computers for wallet addresses and replacing them with ones controlled by attackers. This method allows hackers to intercept transactions and divert funds without the user noticing.

Stolen Funds and Global Impact

As of November 2024, researchers identified one attacker-controlled wallet that had received over 5 BTC (worth approximately $443,000). The malware has primarily affected developers in Russia, Brazil, and Turkey, but infections have been detected worldwide.

GitVenom also collects sensitive data, including browser credentials, banking information, and passwords, which it then sends to attackers via Telegram. The malware’s ability to remain undetected makes it particularly dangerous for developers who frequently use open-source code.

Precautionary Measures for Developers

Security experts warn that GitHub and other code-sharing platforms are commonly exploited by cybercriminals due to their widespread use. Developers are advised to:

Key Highlights:
  • Verify third-party code before integrating it into projects.
  • Regularly scan for malware on their devices.
  • Avoid running unverified scripts from unknown sources.

The discovery of GitVenom highlights the growing risks facing developers in the cryptocurrency space. With increasing reliance on open-source repositories, maintaining security hygiene is essential to prevent financial losses and data breaches.

Read the full article on decrypt.