Will Adams WillAdamsDotDev
Scam Alert

Important: Scam Alert Involving Cometec and a Fork of ProShop

I want to address a recurring issue that has been brought to my attention over the past few months. Several developers have contacted me about scams orchestrated by a company called Cometec (https://cometec.io). These scams involve malicious code and fraudulent behavior, often targeting freelance developers on platforms like Upwork and Telegram. This post aims to clarify the situation, warn others, and provide transparency about my involvement (or lack thereof).

Background 🕵️‍♂️

The project at the center of this scam is Cometec’s NFT Marketplace repository (https://github.com/cometec/nft_marketplace), which is a fork of the ProShop v2 repository (https://github.com/bradtraversy/proshop-v2). For context:

While forking open-source projects is perfectly legitimate, Cometec has misused this functionality to include malicious code in their fork. Worse, they have edited commit metadata to make it appear as though I made these changes.

The Issue ⚠️

Examples of the Scam 🛑

Below are examples of what developers have encountered, extracted from Telegram chats:

Telegram Screenshot 1
Telegram Screenshot 2

In these messages, developers have described:

Key Points to Note 📝

  1. I Have No Affiliation with Cometec:

    • I did not create, modify, or endorse their fork.
    • My contributions to ProShop v2 are legitimate, but I am in no way connected to Cometec’s malicious actions.
  2. Commit Metadata Can Be Spoofed:

    • Anyone with access to my publicly visible email address can spoof commits with my name and email. This does not mean they accessed my account.
  3. GitHub Is Aware:

    • I have reported Cometec to GitHub, providing evidence of their actions. Unfortunately, their repository remains private, limiting my ability to investigate further.

The Cryptocurrency Exploit Explained 🔐

Many of the developers affected by this scam were using Metamask, a popular cryptocurrency wallet. Here’s how Cometec’s malicious code likely operated:

  1. Compromised Wallets: The code targeted Metamask wallets by accessing cached or decrypted private keys when the wallet was unlocked in the browser.
  2. Stolen Credentials: Once the private keys were obtained, the scammers could sign transactions on the victim’s behalf and steal their cryptocurrency.
  3. Malicious Scripts: The malicious scripts might have connected to a command-and-control (C2) server, enabling further exploitation, such as installing additional malware or directly transferring wallet data.

Metamask wallets are used to store and transfer various cryptocurrencies like Ethereum, Tether, and USDC. These wallets rely on a seed phrase to generate private keys, which are critical to securing user funds.

My Advice to Developers 🛠️

Actions I Am Taking 🔒

How You Can Help 🤝

Conclusion ✅

Open-source projects thrive on trust and collaboration, but unfortunately, bad actors like Cometec exploit these values. I am committed to transparency and hope this post clears up any confusion. If you have any questions or concerns, feel free to reach out.

Stay vigilant and safe,
Will Adams