Cybersecurity firm OX Security has identified a widespread phishing campaign targeting developers who interact with OpenClaw, an open-source AI agent project withCybersecurity firm OX Security has identified a widespread phishing campaign targeting developers who interact with OpenClaw, an open-source AI agent project with

Hackers Are Targeting AI Developers With Fake Token Airdrops

2026/03/19 23:31
3 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Cybersecurity firm OX Security has identified a widespread phishing campaign targeting developers who interact with OpenClaw, an open-source AI agent project with 324,000 GitHub stars, using fake token airdrop offers to drain crypto wallets and steal SSH credentials.

How the Attackers Find Their Targets

According to report by OX, the campaign begins with data collection rather than mass distribution. Attackers use the GitHub API to scrape profiles of developers who have starred or contributed to OpenClaw repositories. That targeting approach means victims are not selected randomly. They are selected because their public GitHub activity confirms they are active in the AI development space and have a demonstrated interest in the specific project being impersonated.

Distribution exploits GitHub’s own notification infrastructure. Attackers create fake GitHub accounts and open issue threads or discussions in repositories they control. They then mass-tag the scraped developer profiles, triggering legitimate notification emails sent from notifications@github.com. Because the sending address is genuine, standard spam filters do not catch them. The email looks exactly like a normal GitHub mention notification.

The bait is a $5,000 CLAW token airdrop presented as a reward for the developer’s contributions to the project.

What Happens When a Developer Clicks

Victims are directed to a cloned version of the official openclaw.ai website, typically hosted on malicious domains such as token-claw[.]xyz. The fake site is visually indistinguishable from the legitimate one. It features a Connect Wallet button. Once a developer connects their wallet, obfuscated JavaScript initiates a draining sequence. The specific file identified by researchers is named eleven.js.

The malware includes a forensic evasion function researchers are calling a nuke command. After the wallet drain completes, the script wipes browser local storage to remove evidence of the attack and complicate post-incident investigation.

The campaign runs a parallel attack vector through the npm package registry. Malicious packages including @openclaw-ai/openclawai are listed as official installers for the project. Developers who install them deploy the GhostLoader trojan, which targets SSH keys and crypto wallet files stored on the local machine. That vector bypasses wallet connection entirely and compromises the developer’s broader credential set.

Bitcoin Sinks to $70,000: The Oldest Hands in the Market Are Selling

Why OpenClaw Is the Target

The choice of OpenClaw as the impersonation target is not arbitrary. The project’s rapid growth to 324,000 GitHub stars creates a large, identifiable, and technically sophisticated pool of targets. Developers active in AI agent development are more likely to hold crypto assets and interact with wallet infrastructure than a general software development audience.

The campaign also exploits a credibility gap. OpenClaw is a non-commercial open-source project with no token. Developers unfamiliar with that detail have no immediate reason to doubt a token airdrop framed as a community reward. The $5,000 figure is large enough to motivate action but not so large as to trigger immediate skepticism.

What OpenClaw’s Creator Says

Peter Steinberger, who created OpenClaw, has issued a direct public warning. Any crypto-themed outreach connected to the project is always a scam. Steinberger was explicit that OpenClaw has no token, has no plans for a token, and will never conduct crypto-themed outreach of any kind. The project is non-commercial and open-source by design.

Security researchers recommend that developers immediately block the domain token-claw[.]xyz and treat any unsolicited GitHub mention referencing token allocations or airdrops as fraudulent regardless of how the notification arrives. The legitimate-looking sender address is the specific mechanism making this campaign difficult to filter automatically.

The post Hackers Are Targeting AI Developers With Fake Token Airdrops appeared first on ETHNews.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Sobering warning issued about America's 'ticking time-bombs' Trump may soon detonate

Sobering warning issued about America's 'ticking time-bombs' Trump may soon detonate

An economics expert issued a sobering warning on Thursday about the impact President Donald Trump's war in Iran could have at home. Catherine Rampell, economics
Share
Rawstory2026/03/20 09:03
Trump tells Israel not to repeat strikes on Iranian energy as crisis deepens

Trump tells Israel not to repeat strikes on Iranian energy as crisis deepens

QatarEnergy's liquefied natural gas production facilities, amid the US-Israeli conflict with Iran, in Ras Laffan Industrial City, Qatar March 2, 2026.
Share
Rappler2026/03/20 09:08
BlockDAG’s $0.0013 Entry Draws Market Attention Ahead of Deadline

BlockDAG’s $0.0013 Entry Draws Market Attention Ahead of Deadline

The post BlockDAG’s $0.0013 Entry Draws Market Attention Ahead of Deadline appeared on BitcoinEthereumNews.com. Crypto News 20 September 2025 | 00:00 Discover why BlockDAG’s $0.0013 entry is making headlines with nearly $410M raised, 26.3B coins sold, and the limited-time entry closing on Oct 1st. Occasionally, a single figure captures attention across crypto. This time, it isn’t a projection or a chart setup; it is a presale entry point. The $0.0013 price lock from BlockDAG (BDAG) has become more than a presale detail. It represents a marker of timing, reliability, and measurable progress. With more than 26.3 billion coins sold and nearly $410 million already secured, this price is not a teaser. It is a structured offer that continues to attract participants in large numbers. Once October 1st passes, the $0.0013 entry will close, and its significance could be remembered as one of those rare early-stage milestones. The $0.0013 Window Reflects More Than a Temporary Offer Many presales are defined by uncertainty, often shifting timelines and unclear goals. By fixing its presale price at $0.0013 until October 1st, BlockDAG has created a point of clarity in a crowded market. It is less about a discount and more about a defined statement: the project is setting a clear cut-off for early access. This approach has shown results. Over 26.3 billion BDAG coins have already been purchased. That momentum stems from demonstrated progress, not just speculation. A live Testnet, close to 20,000 miners distributed, and more than 3 million daily users of the X1 mobile miner all point to activity happening now rather than deferred promises. On top of this, the return profile is notable. The current batch price is $0.03, while the $0.0013 entry remains open for a limited time. That gap means an ROI of about 2,900% compared with batch 1. Even so, the project is keeping the entry level steady until October 1st, providing…
Share
BitcoinEthereumNews2025/09/20 06:25