Skip to content
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
Cannot retrieve contributors at this time

CloutSpy and BitWatcher Security Incident - Trojan


  1. Contributors
  2. Synopsis
  3. TL;DR
  4. Mechanism
  5. Decompilation
  7. Known Affected/Compromised Accounts

1. Contributors

2. Synopsis

This is a security bulletin about CloutSpy and BitWatcher. The following document will reference both of these applications as "CloutSpy/BitWatcher"

CloutSpy/BitWatcher a malicious desktop application that claims to show users various on-chain interactions between other bitclout users that one could specify. The application also attempts to steal bitclout identity information by scanning for browser data on the victim's hard disk, and sending them to a specific endpoint. The details of this mechanism are below.

If you have used CloutSpy or Bitwatcher at any time in the past, and don't care about the technical details, please CLICK HERE

3. TL;DR

CloutSpy/BitWatcher scans your local browser's files for BitClout related login data, and upon finding stored login info, attempts to send it to an outpost server.

This means if you've ever used CloutSpy/BitWatcher on a computer that you've also logged into BitClout with, your BitClout account may have been compromised. Please go to the bottom of this page for information on how you can secure your BitClout account.

At this time, it does not appear that CloutSpy/BitWatcher continues to execute in the background after the foreground application is killed. This note should be taken with caution

It is to be noted that the repository's codebase itself never contained the trojan's code that was found in the binaries. May this be a reminder that the only way you 100% know what is running is if you examine the code, and build it yourself. There are many safe third party applications on BitClout, however one should always be very cautious with their identities in general.

4. Mechanism

CloutSpy/BitWatcher claims to be an open source project on GitHub, however upon decompiling versions 2.2, 2.1, and 2.0 of CloutSpy, (and 2.0 of BitWatcher) one can find an attempt to read files that may contain cookies, and/or localStorage of the most popular browsers, like the Chrome/Chromium suite (Chrome, Chromium, Brave, Edge, etc), FireFox, and Opera. The application iterates through each potential browser installed on the victim's PC, and upon finding specific strings, adds them to a mass payload, and sends a payload to a specific endpoint,


  participant 0 as Victim
  participant 1 as CloutSpy/Bitwatcher.exe
  participant 2 as CloutSpy UI
  participant 3 as get_localstorage
  participant 4 as Victim Browser Data on Disk
  participant 5 as

  0->>1: User Executes CloutSpy.exe/BitWatcher.exe
  par [Starts UI]
    1->>2: Get App UI
    2->>1: Show App UI to User
    1->>0: Show UI
  and [Starts Scan Thread]
    1->>3: Start
    3->>4: Scan for BitClout User Data
    4->>5: Send Payload With scan result

5. Decompilation

The single binary was created with PyInstaller, and was decompiled using decompyle3


If you have ever used CloutSpy/BitWatcher in the past, it is important to follow these instructions:

  • Delete CloutSpy.exe/BitWatcher.exe
  • Create a new BitClout Account
  • Transfer all of your holdings to the new account
  • Rename the previous account and reclaim your username on the new account.

7. Known Affected/Compromised Accounts

The following accounts are known to have been compromised: