The phishing campaign lures OpenClaw developers with fake $5,000 token airdrops, then drains wallets through a cloned site with a hidden connection prompt.
Hackers target OpenClaw developers with fake GitHub repos and phishing sites, tricking users into connecting wallets and losing funds.