GitHub Phishing Attack Targets OpenClaw Developers With Fake Token Airdrops

A new phishing campaign targeting developers has emerged on GitHub, where attackers are impersonating the OpenClaw project to distribute fake token airdrops and compromise crypto wallets. Security researchers have identified a coordinated effort in which malicious accounts approach developers with offers of free tokens, typically valued at several thousand dollars, to lure them into interacting with fraudulent platforms. The attack highlights growing risks at the intersection of developer ecosystems and digital assets, as threat actors increasingly exploit trusted environments to gain access to sensitive financial credentials and blockchain based wallets.

The attackers are reportedly creating fake GitHub profiles and engaging directly with developers through issue threads and project discussions, making the outreach appear legitimate. Victims are told they have been selected for a token reward and are directed to websites that closely replicate the official OpenClaw interface. These cloned pages include prompts encouraging users to connect their crypto wallets in order to claim the supposed rewards. Once users grant access, malicious code can initiate unauthorized transactions or approvals, allowing attackers to drain funds from the connected wallets without immediate detection.

The phishing infrastructure has been designed to support widely used wallet providers, increasing the scale and potential impact of the campaign. By targeting platforms such as MetaMask, WalletConnect, and Trust Wallet, attackers can reach a broad base of users across different ecosystems. This method leverages social engineering tactics combined with technical exploitation, taking advantage of the trust developers place in familiar tools and platforms. The approach reflects a broader trend in crypto related attacks, where user interaction becomes the primary entry point for compromising funds.

This incident builds on a series of scams that have used the OpenClaw name to attract attention and credibility within the developer community. The project itself has gained visibility as an open source framework for AI agents, making it a prime target for misuse by malicious actors. Previous incidents linked to fake tokens associated with the project have already raised concerns, prompting efforts to limit crypto related discussions within its official channels. The continued targeting of the project underscores how quickly emerging technologies can become focal points for coordinated fraud campaigns.

The latest phishing wave reinforces the need for heightened vigilance among developers and crypto users alike. As blockchain adoption expands and developer tools become more integrated with financial systems, attackers are refining their tactics to exploit these connections. Industry experts continue to warn that unsolicited offers involving token rewards or wallet connections should be treated with caution, especially when delivered through informal channels. The incident serves as a reminder that security in the digital asset space extends beyond infrastructure to include user awareness and responsible interaction with online platforms.

Share it :