Home / Crime and Justice / North Korean Hackers Exploit GitHub for Crypto
North Korean Hackers Exploit GitHub for Crypto
11 Apr
Summary
- New malware, Omnistealer, steals crypto, passwords, and credentials.
- Hackers use fake job offers on GitHub to deploy malware.
- North Korean state actors likely behind widespread, replicable hack.

A new cyber threat, Omnistealer, has emerged, leveraging fake job offers on GitHub and embedding malicious code within blockchain transactions. This malware, believed to be orchestrated by North Korean state actors, targets cryptocurrency, passwords, and corporate credentials across numerous platforms.
Disguised as freelance web development opportunities, hackers initiate attack chains that pull malicious code from TRON or Aptos blockchains, ultimately deploying Omnistealer. This threat is designed to extract sensitive information from over 60 cryptocurrency wallets, 10 password managers, and 10 web browsers, posing a significant risk.
Investigators have linked this sophisticated hack to IP addresses in Vladivostok, Russia, previously associated with North Korean cyber operations. The malware's ability to persist within growing blockchains makes it difficult to eradicate, and its wide-reaching impact is compared to the 2017 WannaCry ransomware attack.
Developers and contractors, particularly in South Asia, are primary targets due to outsourcing practices and high adoption of blockchain technology. Platforms like LinkedIn and Upwork are being used for initial contact, with hackers posing as recruiters or freelance developers to infiltrate systems.
The FBI is aware of these tactics, highlighting the evolving capabilities of North Korean actors in the web3 space. While the ultimate motives remain unclear, the potential for financial gain and information theft for state-sponsored activities is substantial.