Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Driven Code Attack Targets Crypto Projects

AI-Driven Code Attack Targets Crypto Projects

Posted on April 30, 2026 By CWS

An emerging threat has infiltrated the software development sector, leveraging AI tools in a novel supply chain attack. This cunning campaign, named PromptMink, was detected within an open-source crypto trading project via a code commit co-authored by the AI model, Claude Opus.

This incident reflects a strategic shift in how cybercriminals exploit AI to embed malicious code within genuine development endeavors. The attack was initiated on February 28, 2026, involving a commit to the npm package, openpaw-graveyard, a crypto trading agent. The commit introduced the @solana-launchpad/sdk dependency, which discreetly integrated a harmful package, @validate-sdk/v2, masked as a data validation tool.

Uncovering the Threat

ReversingLabs researchers, who have been monitoring the suspicious @validate-sdk/v2 package since October 2025, were the first to expose this threat. They identified the operation as a coordinated supply chain attack by the North Korean-linked group, Famous Chollima. This group previously orchestrated the Contagious Interview campaign, targeting developers through deceptive job interviews to deploy harmful packages.

The PromptMink campaign utilizes a two-layer method to evade automated security checks. This involves distributing seemingly benign packages that lure developers and AI coding tools by imitating trusted resources. These first-layer packages then import second-layer malicious packages without detection, facilitating silent infiltration into development environments.

Attack Mechanisms and Implications

Upon installation, the @validate-sdk/v2 package searches directories for sensitive data, focusing on environment files, configuration data, and cryptocurrency-related information. These files are compressed and sent to an attacker-controlled server. Initial package versions used base64-encoded URLs to obscure the destination, while newer versions employ a dedicated domain to complicate tracking.

The threat actors have enhanced the malware with capabilities tailored to different operating systems. On Linux, the attacker’s SSH key is added to the victim’s authorized keys, enabling persistent access. On Windows, the malware focuses on exfiltrating sensitive files. Recent Rust-written versions extend this by stealing entire project directories, indicating an intent to commit intellectual property theft.

Defensive Measures for Developers

Developers and security teams are urged to scrutinize AI-generated code commits thoroughly, especially new dependencies. It’s crucial to validate packages via trusted sources and monitor for unusual network activities. Regular audits of SSH authorized keys files are recommended to detect unauthorized entries, which may signify a breach.

Stay informed on emerging threats by following us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for more updates.

Cyber Security News Tags:AI security, Claude Opus, crypto attacks, Cryptocurrency, Cybersecurity, developer security, malicious code, Malware, North Korean hackers, npm package, open source security, PromptMink, ReversingLabs, software development, supply chain attack

Post navigation

Previous Post: EtherRAT Malware Targets Windows via Trojanized Installer
Next Post: Ransomware Attack Exposes Data of 170,000 at Sandhills Medical

Related Posts

30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks Cyber Security News
Toys “R” Us Canada Confirms Data Breach Toys “R” Us Canada Confirms Data Breach Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums Cyber Security News
AI-Powered Apex Enhances App Security by Finding Vulnerabilities AI-Powered Apex Enhances App Security by Finding Vulnerabilities Cyber Security News
India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Linux Kernel Vulnerability Exposes Systems to Attacks
  • Critical Linux Flaw ‘Copy Fail’ Allows Root Access
  • CVE MCP Server Transforms Claude Into Security Analyst
  • Ransomware Attack Exposes Data of 170,000 at Sandhills Medical
  • AI-Driven Code Attack Targets Crypto Projects

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Linux Kernel Vulnerability Exposes Systems to Attacks
  • Critical Linux Flaw ‘Copy Fail’ Allows Root Access
  • CVE MCP Server Transforms Claude Into Security Analyst
  • Ransomware Attack Exposes Data of 170,000 at Sandhills Medical
  • AI-Driven Code Attack Targets Crypto Projects

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark