Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets

Posted on September 25, 2025September 25, 2025 By CWS

Cybercriminals have orchestrated a classy phishing marketing campaign exploiting GitHub’s notification system to impersonate the celebrated startup accelerator Y Combinator, concentrating on builders’ cryptocurrency wallets by means of faux funding alternative notifications.

The assault leverages GitHub’s problem monitoring system to mass-distribute phishing notifications, bypassing conventional electronic mail safety filters through the use of the platform’s respectable notification infrastructure. 

Menace actors created a number of GitHub accounts with names intently resembling Y Combinator, together with ycombinato, ycommbbinator, and ycoommbinator, together with a malicious GitHub software referred to as ycombinatornotify.

Y Combinator Phishing Rip-off

The attackers demonstrated a classy understanding of GitHub’s API limitations and notification mechanisms. 

Every malicious repository generated roughly 500 points earlier than hitting GitHub’s rate-limiting thresholds, with every problem containing phishing content material and tagging quite a few random GitHub usernames to maximise notification distribution. 

The notifications appeared genuine since they originated from GitHub’s official notification system, making them tough for customers to establish as fraudulent instantly.

The phishing messages claimed recipients had been “chosen for funding” and required pockets verification or authorization deposits to entry supposed Y Combinator funding alternatives. 

This social engineering approach targets explicitly the developer group’s familiarity with Y Combinator’s respectable software course of, exploiting the status and desirability related to acceptance into the accelerator program.

The operation employed typosquatting methods, registering the area y-comblnator.com (substituting an “L” for the “I” in “combinator”) to create a convincing duplicate of Y Combinator’s respectable web site. 

This area hosted faux software pages designed to reap cryptocurrency pockets credentials and personal keys from unsuspecting victims.

GitHub’s safety group responded by suspending the malicious accounts and repositories, however the assault’s distributed nature throughout a number of accounts created persistence challenges. 

Affected customers reported staying notification badges that required guide API calls to clear, utilizing instructions like curl -X PATCH with authentication tokens to mark phantom notifications as learn. 

The incident highlights the vulnerability of collaborative improvement platforms to abuse, the place respectable notification techniques will be weaponized for large-scale phishing campaigns concentrating on the cryptocurrency belongings of technical professionals who symbolize high-value targets as a result of their doubtless digital asset holdings.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Combinator, Funds, GitHub, Hackers, Leverage, Mimic, Notifications, Steal, Wallets

Post navigation

Previous Post: New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware
Next Post: Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data

Related Posts

Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Cyber Security News
Microsoft Confirms August 2025 Update Causes Severe Lag in Windows 11 24H2, Windows 10 Versions Cyber Security News
BlackSuit Ransomware Servers Attacking U.S. Critical Infrastructure Seized by Law Enforcement Seizes Cyber Security News
20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly Cyber Security News
How Businesses Prevent Credential Theft with Early Phishing Detection Cyber Security News
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News