Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown

Posted on August 1, 2025August 1, 2025 By CWS

Aug 01, 2025Ravie LakshmananMalware / Synthetic Intelligence
Cybersecurity researchers have flagged a malicious npm bundle that was generated utilizing synthetic intelligence (AI) and hid a cryptocurrency pockets drainer.
The bundle, @kodane/patch-manager, claims to supply “superior license validation and registry optimization utilities for high-performance Node.js purposes.” It was uploaded to npm by a consumer named “Kodane” on July 28, 2025. The bundle is now not accessible for obtain from the registry, however not earlier than it attracted over 1,500 downloads.
Software program provide chain safety firm Security, which found the library, mentioned the malicious options are marketed immediately within the supply code, calling it an “enhanced stealth pockets drainer.”
Particularly, the conduct is triggered as a part of a postinstall script that drops its payload inside hidden directories throughout Home windows, Linux, and macOS techniques, after which proceeds to hook up with a command-and-control (C2) server at “sweeper-monitor-production.up.railway[.]app.”
“The script generates a singular machine ID code for the compromised host and shares that with the C2 server,” Paul McCarty, head of analysis at Security, mentioned, noting that the C2 server lists two compromised machines.Within the npm ecosystem, postinstall scripts are sometimes missed assault vectors—they run robotically after a bundle is put in, that means customers might be compromised with out ever executing the bundle manually. This creates a harmful blind spot, particularly in CI/CD environments the place dependencies are up to date routinely with out direct human evaluation.

The malware is designed to scan the system for the presence of a pockets file, and if discovered, it proceeds to empty all funds from the pockets to a hard-coded pockets deal with on the Solana blockchain.
Whereas this isn’t the primary time cryptocurrency drainers have been recognized in open-source repositories, what makes @kodane/patch-manager stand out are clues that counsel the usage of Anthropic’s Claude AI chatbot to generate it.

This contains the presence of emojis, in depth JavaScript console logging messages, well-written and descriptive feedback, the README.md markdown file written in a method that is in keeping with Claude-generated markdown recordsdata, and Claude’s sample of calling code adjustments as “Enhanced.”
The invention of the npm bundle highlights “how risk actors are leveraging AI to create extra convincing and harmful malware,” McCarty mentioned.The incident additionally underlines rising issues in software program provide chain safety, the place AI-generated packages could bypass typical defenses by showing clear and even useful. This raises the stakes for bundle maintainers and safety groups, who now want to watch not simply identified malware, however more and more polished, AI-assisted threats that exploit trusted ecosystems like npm.

The Hacker News Tags:AIGenerated, Drains, Funds, Malicious, NPM, Package, Solana, Takedown

Post navigation

Previous Post: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them
Next Post: Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft

Related Posts

Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More The Hacker News
Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution The Hacker News
New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions The Hacker News
100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads The Hacker News
CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users The Hacker News
Overcoming Risks from Chinese GenAI Tool Usage The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News