Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Driven Code Attack Targets Crypto Projects

AI-Driven Code Attack Targets Crypto Projects

Posted on April 30, 2026 By CWS

An emerging threat has infiltrated the software development sector, leveraging AI tools in a novel supply chain attack. This cunning campaign, named PromptMink, was detected within an open-source crypto trading project via a code commit co-authored by the AI model, Claude Opus.

This incident reflects a strategic shift in how cybercriminals exploit AI to embed malicious code within genuine development endeavors. The attack was initiated on February 28, 2026, involving a commit to the npm package, openpaw-graveyard, a crypto trading agent. The commit introduced the @solana-launchpad/sdk dependency, which discreetly integrated a harmful package, @validate-sdk/v2, masked as a data validation tool.

Uncovering the Threat

ReversingLabs researchers, who have been monitoring the suspicious @validate-sdk/v2 package since October 2025, were the first to expose this threat. They identified the operation as a coordinated supply chain attack by the North Korean-linked group, Famous Chollima. This group previously orchestrated the Contagious Interview campaign, targeting developers through deceptive job interviews to deploy harmful packages.

The PromptMink campaign utilizes a two-layer method to evade automated security checks. This involves distributing seemingly benign packages that lure developers and AI coding tools by imitating trusted resources. These first-layer packages then import second-layer malicious packages without detection, facilitating silent infiltration into development environments.

Attack Mechanisms and Implications

Upon installation, the @validate-sdk/v2 package searches directories for sensitive data, focusing on environment files, configuration data, and cryptocurrency-related information. These files are compressed and sent to an attacker-controlled server. Initial package versions used base64-encoded URLs to obscure the destination, while newer versions employ a dedicated domain to complicate tracking.

The threat actors have enhanced the malware with capabilities tailored to different operating systems. On Linux, the attacker’s SSH key is added to the victim’s authorized keys, enabling persistent access. On Windows, the malware focuses on exfiltrating sensitive files. Recent Rust-written versions extend this by stealing entire project directories, indicating an intent to commit intellectual property theft.

Defensive Measures for Developers

Developers and security teams are urged to scrutinize AI-generated code commits thoroughly, especially new dependencies. It’s crucial to validate packages via trusted sources and monitor for unusual network activities. Regular audits of SSH authorized keys files are recommended to detect unauthorized entries, which may signify a breach.

Stay informed on emerging threats by following us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for more updates.

Cyber Security News Tags:AI security, Claude Opus, crypto attacks, Cryptocurrency, Cybersecurity, developer security, malicious code, Malware, North Korean hackers, npm package, open source security, PromptMink, ReversingLabs, software development, supply chain attack

Post navigation

Previous Post: EtherRAT Malware Targets Windows via Trojanized Installer
Next Post: Ransomware Attack Exposes Data of 170,000 at Sandhills Medical

Related Posts

Splunk Details on How to Detect, Mitigate and Respond to CitrixBleed 2 Attack Splunk Details on How to Detect, Mitigate and Respond to CitrixBleed 2 Attack Cyber Security News
Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution Cyber Security News
Microsoft Patches Critical Defender Vulnerability Microsoft Patches Critical Defender Vulnerability Cyber Security News
Hackers Mimic as OpenAI and Sora Services to Steal Login Credentials Hackers Mimic as OpenAI and Sora Services to Steal Login Credentials Cyber Security News
Ukrainian Networks Launch Massive Brute-Force and Password-Spraying Campaigns Targeting SSL VPN and RDP Systems Ukrainian Networks Launch Massive Brute-Force and Password-Spraying Campaigns Targeting SSL VPN and RDP Systems Cyber Security News
Nginx UI Flaw Poses Major Security Threat Nginx UI Flaw Poses Major Security Threat Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical cPanel Vulnerability Exploited for Months
  • Hackers Exploit Qinglong RCE Vulnerabilities
  • Linux Kernel Vulnerability Exposes Systems to Attacks
  • Critical Linux Flaw ‘Copy Fail’ Allows Root Access
  • CVE MCP Server Transforms Claude Into Security Analyst

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical cPanel Vulnerability Exploited for Months
  • Hackers Exploit Qinglong RCE Vulnerabilities
  • Linux Kernel Vulnerability Exposes Systems to Attacks
  • Critical Linux Flaw ‘Copy Fail’ Allows Root Access
  • CVE MCP Server Transforms Claude Into Security Analyst

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark