BTCC / BTCC Square / coincentral /
🚨 Alert: Hackers Hijack GitHub with Fake Solana Bot to Drain Crypto Wallets

🚨 Alert: Hackers Hijack GitHub with Fake Solana Bot to Drain Crypto Wallets

Published:
2025-07-04 19:15:17
19
1

Hackers Use Fake Solana Bot on GitHub to Steal Crypto Wallet Funds

Another day, another crypto heist—only this time, hackers are weaponizing GitHub's trust to swipe your SOL.

How? A malicious Solana trading bot, lurking in repos, promises alpha but delivers empty wallets. Classic 'trust-us-with-your-private-keys' scam—yet somehow, it still works.

Security sleuths report victims lost funds within minutes of authorizing the bot. No fancy zero-days here—just social engineering meets copy-paste code.

Meanwhile, Wall Street still thinks 'blockchain' is a type of yoga. Stay paranoid, folks.

TLDR

  • A fake Solana trading bot on GitHub tricked users by mimicking a real open-source project.
  • The scam bot included a hidden package that bypassed official NPM security checks.
  • Once installed, the bot extracted private crypto wallet keys from victims’ computers.
  • Stolen funds were transferred to exchanges like FixedFloat which lack strict identity checks.
  • Cybersecurity firm SlowMist began investigating after a victim reported significant losses on July 2, 2025.

A fraudulent solana trading bot has triggered fresh security concerns after victims reported stolen funds. The malicious software mimicked a legitimate open-source project and successfully deceived users on GitHub. Cybersecurity firm SlowMist investigated the scam after receiving a report from a user on July 2, 2025.

On July 2, a victim reached out to the SlowMist team after losing crypto assets. The cause? Running a seemingly legitimate GitHub project — zldp2002/solana-pumpfun-bot.

🕳️What looked SAFE turned out to be a cleverly disguised trap.

Our analysis revealed:

1️⃣The perpetrator… pic.twitter.com/UkbVLf7owk

— SlowMist (@SlowMist_Team) July 4, 2025

The fake trading tool appeared to help users interact with the Pump.fun platform to trade Solana tokens. However, it included a hidden backdoor used to extract private crypto wallet keys from victims’ systems. Attackers then routed stolen assets through exchanges that do not enforce strong identity checks.

The software project falsely displayed trusted GitHub activity, such as stars and forks, to enhance its credibility. SlowMist confirmed that the bot also used a fake NPM package, which bypassed standard security validation. These deceptive methods allowed malicious scripts to operate undetected.

Solana Bot Scam Exploits GitHub Project

The scam bot operated under the name “solana-pumpfun-bot” and pretended to automate Solana token trading. The bot looked functional but included a dangerous dependency from an unauthorized GitHub repository. This dependency avoided official NPM security checks, which made the code risky.

Once installed, the bot scanned the victim’s system for wallet credentials and private keys. It then transmitted the sensitive data to servers under hacker control, allowing instant unauthorized access to funds. The attackers quickly transferred assets to third-party services such as FixedFloat.

FixedFloat and similar exchanges often lack strict verification, which made tracking difficult. This gave scammers time to MOVE funds without drawing attention. The package “crypto-layout-utils,” used in the scam, has now been removed from the NPM registry.

SlowMist’s Search and Results

SlowMist responded to a victim report and launched a technical audit of the GitHub-based bot. Investigators uncovered that attackers used false GitHub accounts to create a convincing open-source profile. This technique is consistent with supply chain compromise tactics seen in recent years.

The scam highlights how malicious actors use code hosting platforms to distribute dangerous software. Cybercriminals disguise threats within what looks like regular developer tools. This makes detection harder and increases risks for those seeking automation tools.

The firm urged developers to verify all dependencies and examine repository origins. Supply chain attacks now use clever tactics to manipulate trust within developer communities. SlowMist’s report confirmed that bad actors are refining strategies to appear legitimate and trustworthy.

 

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users