In short
- Attackers used faux GitHub accounts to tag builders, claiming they’d gained $5,000 in $CLAW tokens and directing them to a cloned OpenClaw website.
- OX Safety mentioned the phishing web page used closely obfuscated JavaScript and a separate C2 server to empty linked wallets and conceal exercise.
- The accounts had been created final week and deleted inside hours of launch, with no confirmed victims to this point.
OpenClaw’s viral rise has drawn an unpleasant new facet impact: crypto scammers at the moment are utilizing the AI agent venture’s identify to focus on builders in a phishing marketing campaign aimed toward draining their wallets.
Safety platform OX Safety printed a report on Wednesday detailing an energetic phishing marketing campaign concentrating on OpenClaw wherein risk actors create faux GitHub accounts, open situation threads in attacker-controlled repositories, and tag dozens of builders.
The scammer posts GitHub points telling builders, “Admire your contributions on GitHub. We analyzed profiles and selected builders to get OpenClaw allocation,” and claims they’ve gained $5,000 value of $CLAW tokens, directing them to a faux web site that carefully resembles openclaw.ai. The positioning contains an added “Join your pockets” button designed to set off pockets theft.
OX Safety analysis staff lead and a co-author of the report, Moshe Siman Tov Bustan, advised Decrypt they uncovered proof the rip-off try bears resemblance to a marketing campaign that “unfold on GitHub, regarding Solana.”
“[We’re still] analyzing the habits and the relation of those campaigns,” Bustan added.
The phishing marketing campaign surfaced weeks after OpenAI CEO Sam Altman introduced OpenClaw creator Peter Steinberger would lead its push into private AI brokers, with OpenClaw transitioning to a foundation-run open-source venture.
That mainstream profile and the framework’s affiliation with some of the outstanding names in AI make its developer neighborhood an more and more enticing goal.
OX Safety mentioned it had beforehand assessed the attackers could also be utilizing GitHub’s star function to determine customers who’ve starred OpenClaw-related repositories, making the lure seem extra focused and credible.
The platform’s evaluation discovered the wallet-stealing code buried inside a closely obfuscated JavaScript file referred to as “eleven.js.”
“In line with who that was focused and the consumer’s stories on GitHub,” the marketing campaign focused solely customers who “starred the OpenClaw GitHub repository,” Bustan mentioned. “Throughout our evaluation, we discovered just one deal with belonging to the risk actor, which hadn’t despatched or acquired any funds but.”
After deobfuscating the malware, researchers recognized a built-in “nuke” operate that wipes all wallet-stealing information from the browser’s native storage to frustrate forensic evaluation.
The malware tracks consumer actions by way of instructions equivalent to PromptTx, Authorised, and Declined, relaying encoded information, together with pockets addresses, transaction values, and names, again to a C2 server.
Researchers recognized one crypto pockets deal with they consider belongs to the risk actor, 0x6981E9EA7023a8407E4B08ad97f186A5CBDaFCf5, used to obtain stolen funds.
The accounts had been created final week and deleted inside hours of launch, with no confirmed victims to this point, in line with OX Safety.
Decrypt has reached out to Peter Steinberger for remark.
OpenClaw’s crypto magnet downside
OpenClaw, a self-hosted AI agent framework that lets customers run persistent bots linked to messaging apps, e mail, calendars, and shell instructions, hit 323,000 GitHub stars following its acquisition by OpenAI final month.
That visibility rapidly attracted unhealthy actors, with OpenClaw creator Peter Steinberger saying crypto spam flooded OpenClaw’s Discord nearly “each half hour,” forcing bans and in the end a blanket prohibition after what he described to Decrypt as “nonstop coin promotion.”
In contrast to chat-based AI instruments, OpenClaw brokers persist, wake on a schedule, retailer reminiscence regionally, and execute multi-step duties autonomously.
OX Safety recommends blocking token-claw[.]xyz and watery-compost[.]immediately throughout all environments, avoiding connecting crypto wallets to newly surfaced or unverified websites, and treating any GitHub situation selling token giveaways or airdrops as suspicious, significantly from unknown accounts.
Customers who not too long ago linked a pockets ought to revoke approvals instantly, the platform warned.
Editor’s word: Provides remark from OX Safety’s Bustan
Day by day Debrief E-newsletter
Begin on daily basis with the highest information tales proper now, plus authentic options, a podcast, movies and extra.

