Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown

Posted on August 1, 2025August 1, 2025 By CWS

Aug 01, 2025Ravie LakshmananMalware / Synthetic Intelligence
Cybersecurity researchers have flagged a malicious npm bundle that was generated utilizing synthetic intelligence (AI) and hid a cryptocurrency pockets drainer.
The bundle, @kodane/patch-manager, claims to supply “superior license validation and registry optimization utilities for high-performance Node.js purposes.” It was uploaded to npm by a consumer named “Kodane” on July 28, 2025. The bundle is now not accessible for obtain from the registry, however not earlier than it attracted over 1,500 downloads.
Software program provide chain safety firm Security, which found the library, mentioned the malicious options are marketed immediately within the supply code, calling it an “enhanced stealth pockets drainer.”
Particularly, the conduct is triggered as a part of a postinstall script that drops its payload inside hidden directories throughout Home windows, Linux, and macOS techniques, after which proceeds to hook up with a command-and-control (C2) server at “sweeper-monitor-production.up.railway[.]app.”
“The script generates a singular machine ID code for the compromised host and shares that with the C2 server,” Paul McCarty, head of analysis at Security, mentioned, noting that the C2 server lists two compromised machines.Within the npm ecosystem, postinstall scripts are sometimes missed assault vectors—they run robotically after a bundle is put in, that means customers might be compromised with out ever executing the bundle manually. This creates a harmful blind spot, particularly in CI/CD environments the place dependencies are up to date routinely with out direct human evaluation.

The malware is designed to scan the system for the presence of a pockets file, and if discovered, it proceeds to empty all funds from the pockets to a hard-coded pockets deal with on the Solana blockchain.
Whereas this isn’t the primary time cryptocurrency drainers have been recognized in open-source repositories, what makes @kodane/patch-manager stand out are clues that counsel the usage of Anthropic’s Claude AI chatbot to generate it.

This contains the presence of emojis, in depth JavaScript console logging messages, well-written and descriptive feedback, the README.md markdown file written in a method that is in keeping with Claude-generated markdown recordsdata, and Claude’s sample of calling code adjustments as “Enhanced.”
The invention of the npm bundle highlights “how risk actors are leveraging AI to create extra convincing and harmful malware,” McCarty mentioned.The incident additionally underlines rising issues in software program provide chain safety, the place AI-generated packages could bypass typical defenses by showing clear and even useful. This raises the stakes for bundle maintainers and safety groups, who now want to watch not simply identified malware, however more and more polished, AI-assisted threats that exploit trusted ecosystems like npm.

The Hacker News Tags:AIGenerated, Drains, Funds, Malicious, NPM, Package, Solana, Takedown

Post navigation

Previous Post: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them
Next Post: Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft

Related Posts

U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm The Hacker News
Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts The Hacker News
Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code The Hacker News
Beware the Hidden Risk in Your Entra Environment The Hacker News
Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence The Hacker News
A Pragmatic Approach To NHI Inventories  The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News