Security researchers have uncovered an active phishing campaign that leverages GitHub's platform to target software developers with a cryptocurrency scam. The attackers impersonate the OpenClaw project, creating fake issue threads and tagging developers to lure them with a supposed $5,000 token airdrop. The link provided in the lure directs victims to a well-crafted phishing site that is a near-perfect clone of the legitimate OpenClaw website. The phishing site's sole malicious purpose is to trick users into clicking a "Connect your wallet" button, which triggers a wallet-draining script. This campaign is a prime example of social engineering, as it targets users who have already expressed interest in the project, making the lure more believable.
token-claw[.]xyzwatery-compost[.]today0x6981E9EA7023a8407E4B08ad97f186A5CBDaFCf5The attack chain is a multi-step process designed to build credibility and evade simple detection:
T1566.002 - Spearphishing Link: The attackers create fake GitHub accounts and open a new "Issue" in a repository they control. They then @mention dozens of their targeted developers in this issue, causing GitHub to send a notification to each one. The issue contains the phishing lure.T1204.001 - Malicious Link: The developer clicks the link in the GitHub notification, which leads to the phishing site token-claw[.]xyz.| Type | Value | Description |
|---|---|---|
| URL | token-claw[.]xyz |
Phishing Website |
| Domain | watery-compost[.]today |
Command-and-Control Server |
| Wallet Address | 0x6981E9EA7023a8407E4B08ad97f186A5CBDaFCf5 |
Attacker's cryptocurrency wallet |
@mention in an issue from an unknown user or repository, especially one promising financial rewards.token-claw[.]xyz uses a common phishing technique of domain impersonation (cybersquatting). The legitimate domain is openclaw.ai.M1017 - User Training).The most effective mitigation is to train users to be skeptical of unsolicited offers and to verify information through official channels before clicking links or connecting wallets.
Using web filters and DNS blocklists to prevent users from accessing known phishing sites is a crucial technical control.
To defend against phishing campaigns like the fake OpenClaw airdrop, organizations and individuals must practice rigorous URL Analysis. Before clicking any link, especially one in an unsolicited message, hover over it to see the true destination. In this case, the link would point to token-claw[.]xyz, not the official openclaw.ai. This discrepancy is a major red flag. Security teams should deploy web proxies and DNS filters that automatically analyze and block access to newly registered domains and those with a history of being used for phishing. For developers, this means cultivating a habit of skepticism and manually typing in the known, official URL of a project rather than trusting a link from an unverified source like a random GitHub issue.
For developers and security researchers who need to investigate potentially malicious sites, using a Decoy Environment is essential. Instead of connecting their real wallet, they should use a dedicated, isolated virtual machine or browser profile that has no access to their real data or assets. They can then use a 'burner' wallet—a brand new crypto wallet with a negligible amount of funds—to interact with the site. This allows them to safely observe the site's malicious behavior, capture the wallet-draining script, and analyze the attacker's TTPs without risking any real financial loss. This technique turns the attack on its head, allowing defenders to gather valuable threat intelligence from the attacker's own infrastructure.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats