Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ghost Campaign Targets Crypto Wallets via Malicious npm Packages

Ghost Campaign Targets Crypto Wallets via Malicious npm Packages

Posted on March 24, 2026 By CWS

Cybersecurity experts have recently identified a concerning development in the form of several malicious npm packages designed to compromise cryptocurrency wallets and obtain sensitive user data. This new threat, termed the Ghost campaign, is being carefully monitored by ReversingLabs. The packages, uploaded by an entity using the pseudonym ‘mikilanjillo’, include notable names such as ‘react-performance-suite’, ‘react-state-optimizer-core’, and ‘ai-fast-auto-trader’, among others.

Uncovering the Ghost Campaign

ReversingLabs reports that these npm packages employ sophisticated techniques to deceive users. They simulate legitimate installation processes while actually prompting users to input their sudo passwords. This deception is achieved through fake npm install logs and random delays that mimic genuine package installations. Upon entering the password, the malware discreetly downloads a secondary payload and contacts a Telegram channel to receive the final instructions and decryption key.

The campaign’s ultimate goal is to deploy a remote access trojan that can gather data, specifically targeting cryptocurrency wallets. This highlights the increasing complexity and ambition of cybercriminals in targeting digital assets.

Connections to GhostClaw Activity

Interestingly, ReversingLabs has noted similarities between this campaign and a previously documented activity cluster known as GhostClaw, reported by JFrog. While it remains uncertain whether the same threat actors are responsible, GhostClaw also utilizes GitHub repositories and AI-assisted development workflows to distribute macOS credential-stealing payloads. By impersonating legitimate development tools and trading bots, these repositories gain credibility and trust among users.

The repositories initially contain benign code, which is later replaced by malicious components. This strategy of delayed activation allows for the establishment of trust before executing harmful actions, such as deploying a stealer that captures system credentials and delivers malware via a command-and-control server.

Implications and Future Outlook

The Ghost campaign underscores a worrying trend in the evolution of cyber threats. Attackers are increasingly leveraging well-regarded platforms like GitHub and npm, along with AI-driven workflows, to disseminate malware with minimal suspicion. By exploiting trusted ecosystems, they effectively bypass traditional security measures, posing a significant threat to unsuspecting developers and users.

As the cybersecurity landscape continues to evolve, vigilance and proactive measures are crucial in countering these sophisticated threats. Individuals and organizations must remain informed and employ robust security practices to safeguard their digital assets and sensitive information.

With ongoing investigations, cybersecurity professionals are working diligently to mitigate the impact of such campaigns and develop strategies to prevent future attacks. The need for continuous innovation in cybersecurity defense mechanisms has never been more critical.

The Hacker News Tags:AI Workflows, credential theft, crypto theft, crypto wallets, Cybersecurity, Ghost campaign, GitHub, Malware, npm packages, ReversingLabs

Post navigation

Previous Post: Enhancing Threat Monitoring to Outpace Attackers
Next Post: Webinar Explores Practical Use of CIS Controls

Related Posts

AI Tool CyberStrikeAI Powers Global FortiGate Attacks AI Tool CyberStrikeAI Powers Global FortiGate Attacks The Hacker News
Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads The Hacker News
Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks The Hacker News
Critical Telnetd Security Flaw Allows Remote Code Execution Critical Telnetd Security Flaw Allows Remote Code Execution The Hacker News
TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert The Hacker News
Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark