Overview
A new GitHub phishing scam has surfaced, where cybercriminals are impersonating Y Combinator, the prestigious startup accelerator, to steal developers’ cryptocurrency wallets. The attack leverages GitHub’s notification and issue tracking system to bypass traditional email security and trick developers with fake investment opportunities.
How the GitHub Phishing Attack Works
Threat actors created multiple fake GitHub accounts with names resembling Y Combinator, including ycombinato, ycommbbinator, and ycoommbinator. They even launched a malicious GitHub app named ycombinatornotify. Each fraudulent repository generated nearly 500 issues before hitting GitHub’s API rate limits. These issues contained phishing messages and tagged random GitHub users, ensuring the malicious notifications spread widely and appeared authentic since they were delivered via GitHub’s legitimate notification system.
Fake Y Combinator Funding Opportunity
Victims received notifications claiming they had been “selected for funding” by Y Combinator. To access this supposed investment, developers were asked to verify their cryptocurrency wallets or make authorization deposits. This social engineering tactic exploited the credibility of Y Combinator and the high value associated with joining its accelerator program.
