Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Crypto Developers Attacked With Malicious npm Packages to Steal Login Details

Posted on August 19, 2025August 19, 2025 By CWS

A classy new menace marketing campaign has emerged focusing on cryptocurrency builders by way of malicious npm packages designed to steal delicate credentials and pockets info.

The assault, dubbed “Solana-Scan” by researchers, particularly targets the Solana cryptocurrency ecosystem by masquerading as reputable software program improvement kits and scanning instruments.

The marketing campaign facilities round a number of malicious npm packages, together with “solana-pump-test” and “solana-spl-sdk,” revealed by a menace actor utilizing the deal with “cryptohan” with the e-mail deal with crypto2001813@gmail[.]com.

These packages current themselves as superior Solana file scanning and add SDKs with multi-threading capabilities, intentionally mimicking reputable improvement instruments to deceive unsuspecting builders.

solana-pump-test and solana-spl-sdk (Supply – Security)

Security researchers recognized this menace marketing campaign by way of their malicious bundle detection know-how, discovering that the packages comprise closely obfuscated JavaScript payloads designed to reap cryptocurrency-related credentials and delicate recordsdata.

The malware particularly targets recordsdata with extensions together with .env, .json, .one, .one1, .one2, and .txt, utilizing common expressions to establish potential cryptocurrency tokens and pockets credentials saved on compromised methods.

The marketing campaign demonstrates a regarding development of menace actors leveraging the npm ecosystem to distribute subtle infostealers.

With over 17,000 recordsdata already collected in response to the uncovered command and management infrastructure, the assault seems to have achieved important attain throughout the focused developer group.

Notably troubling is the obvious give attention to Russian cryptocurrency builders, with sufferer IP addresses traced to Moscow, whereas the command and management server operates from a US-based infrastructure at IP deal with 209.159.159.198.

Multi-Stage An infection and Persistence Mechanism

The malware employs a classy multi-stage deployment technique that begins with the universal-launcher.cjs file, which serves because the preliminary entry level.

This launcher script performs in depth environmental reconnaissance, gathering system info together with the username, working listing, and npm set up mode.

Common-launcher.js Javascript (Supply – Security)

The code incorporates telltale indicators of AI-assisted technology, together with console.log messages with emojis and particular coding patterns in keeping with instruments like Anthropic’s Claude.

const _0x35a3f5 = course of.env.DETECTED_USERNAME;
const _0x459771 = course of.env.WORKING_DIR;
const _0x45a3ca = course of.env.NPM_INSTALL_MODE === “true”;
console.log(“🚀 Common Launcher NPM Set up Mode: ” + _0x45a3ca);

As soon as executed, the launcher searches for secondary payloads (index.js or index.cjs recordsdata) and launches them as background processes to keep up persistence.

The principle payload then conducts a complete file system scanning, focusing on person directories together with Paperwork, Downloads, and Desktop folders whereas intelligently excluding development-related directories reminiscent of node_modules and .git to keep away from detection.

The collected information is packaged into JSON format and exfiltrated to the command and management server, the place an uncovered net interface reveals the disturbing scope of the operation, displaying stolen recordsdata together with password databases, cryptocurrency trade credentials, and pockets recordsdata from compromised victims.

Increase your SOC and assist your workforce defend your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacked, Crypto, Details, Developers, Login, Malicious, NPM, Packages, Steal

Post navigation

Previous Post: CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks
Next Post: SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security

Related Posts

10 Best NGINX Monitoring Tools Cyber Security News
MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials Cyber Security News
Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims Cyber Security News
Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency Cyber Security News
APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack Cyber Security News
Reflectiz Now Available on the Datadog Marketplace Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News