GitVenom Campaign Exploits GitHub to Target Crypto Users

Red | Attack Report
Download PDF

The GitVenom campaign spreads malware via fake GitHub repositories, targeting developers and cryptocurrency users worldwide. Attackers hide malicious code in projects like automation tools, crypto bots, and game cheats. The malware deploys Node.js Stealer, AsyncRAT, Quasar RAT, and clipboard hijackers to steal credentials and funds. Notably, the attackers’ Bitcoin wallet received nearly 5 BTC (around $485,000) in November 2024 alone. To prevent infection, users should verify repositories, inspect code, and use security tools.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs