
OX Security states that attackers are targeting OpenClaw developers on GitHub with fake CLAW token giveaways and cloned wallet-connection pages that can drain crypto assets.
OpenClaw-related scams have expanded from fraudulent emails to a phishing campaign targeting developers on GitHub, according to OX Security. The cybersecurity firm said attackers used fake GitHub accounts to tag users in OpenClaw-related issue threads and promised roughly $5,000 in fake CLAW tokens, directing them to a near-identical clone of the OpenClaw website. The spoofed site prompts users to connect wallets including MetaMask, WalletConnect and Trust Wallet, enabling malicious approvals or transactions that can drain funds. OX Security said the campaign targeted users who had interacted with OpenClaw repositories, making the outreach appear more credible. The incident follows earlier scams tied to OpenClaw’s name, including a fake token that briefly reached a $16 million market cap before collapsing, after which founder Peter Steinberger banned crypto discussion in the project’s Discord.