icon
icon
icon
icon
🏷️$300 Off
🏷️$300 Off

News /

Articles /

Cryptocurrency Wallets Targeted in NPM Supply Chain Attack

Coin WorldFriday, Apr 11, 2025 2:57 pm ET
2min read

A new software supply chain attack has been discovered in the npm registry, targeting users of popular cryptocurrency wallets such as Atomic Wallet and Exodus. The malicious npm package, named pdf-to-office, is designed to perform PDF to Word document conversions but actually functions as a stealth tool to steal cryptocurrency. The program includes secret malicious code that acts as a crypto theft mechanism, overriding cryptocurrency wallet addresses during fund transfers. The attacker replaces the cryptocurrency addresses sent with their own wallet addresses after the victims attempt a payment, redirecting the money to the criminal.

The malicious package was first uploaded to npm on March 24, 2025, and has since received three updates. The latest release, version 1.1.2 from April 8, has reached 334 downloads. This incident is not isolated; two additional npm packages, ethers-provider2 and ethers-providerz, underwent an exposure attack a few weeks prior. These packages contained code that attempted to establish reverse shell connections on vulnerable machines, allowing the attacker to gain remote access and control through the compromised shells.

In the case of pdf-to-office, the malware is more targeted. It initially scans for the presence of the Atomic Wallet application on the computer system. If detected, the malware overwrites a system file key with a modified version containing Trojan code. This modified key file hides under the original but manipulates outgoing wallet addresses to redirect them to the attacker’s control. The Exodus wallet faces a similar style of malicious assault, with the malware specifically targeting certain versions of both Atomic Wallet and Exodus Wallet. The attackers designed their attack in advance to synchronize with the specific formats of these versions.

Uninstalling the malicious npm package from the system does not restore the damage it caused, as the compromised wallet software remains infected. Infected wallet software fails to remove virus infections, allowing the funds to be continuously redirected. Users must undertake a complete deletion of their wallets from their computer before installing new versions to mitigate the risk. This attack demonstrates an increasing tendency towards cybercriminal behavior, with supply chain attacks being conducted through the open-source software platform npm. These vulnerabilities become more complex to identify because their objective is to infect software at development stages or when users install applications.

Additionally, the threat analysis included information about related security risks. It showed that 10 malevolent Visual Studio Code extensions succeeded in being uploaded. These extensions perform clandestine downloads of PowerShell scripts, which remove Windows security functions, create automatic execution schedules to operate indefinitely, and establish an XMRig cryptocurrency mining tool. The recent discoveries demonstrate that cybercriminals are continuously developing new techniques to rob crypto users. Development teams, together with users, need constant awareness, particularly during public registry package downloads. The swift changes in the software world demand routine maintenance for software protection and the preservation of funds.

Comments

Add a public comment...
Post
User avatar and name identifying the post author
big_nate410
04/11
npm's Trojan horse: stealing crypto since March 24
0
Reply
User avatar and name identifying the post author
alpha_mu
04/11
@big_nate410 npm: where packages come with a hidden payload. YOLO on those crypto gains.
0
Reply
User avatar and name identifying the post author
bottlethecat
04/11
If you're using affected wallets, nuke 'em from orbit and reinstall. Better safe than sorry in crypto.
0
Reply
User avatar and name identifying the post author
elpapadoctor
04/11
Whoa, cyber threats are getting sneaky! Keep your crypto wallets tight, or the gremlins might steal your lunch.
0
Reply
User avatar and name identifying the post author
tenebrium38
04/11
Supply chain attacks are the new normal, folks.
0
Reply
User avatar and name identifying the post author
MyNi_Redux
04/11
Gotta keep those wallets safe, peeps. This attack's sneaky, but awareness is the best shield. Stay vigilant, crypto fam.
0
Reply
User avatar and name identifying the post author
mav101000
04/11
@MyNi_Redux 👍
0
Reply
User avatar and name identifying the post author
SpirituallyAwareDev
04/11
Keep wallets offline, public networks are risky! 💰
0
Reply
User avatar and name identifying the post author
Didntlikedefaultname
04/11
NPM attack shows crypto's wild west reality
0
Reply
User avatar and name identifying the post author
Raphaelba
04/11
@Didntlikedefaultname True, crypto's a wild west.
0
Reply
User avatar and name identifying the post author
Living_Ad_4992
04/11
Holy!the Peak Seeker algorithm successfully identified both trough and apex inflection points in MSTF equity's price action, while my execution latency resulted in material opportunity cost.
0
Reply
User avatar and name identifying the post author
liano
04/11
@Living_Ad_4992 😂
0
Reply
Disclaimer: The news articles available on this platform are generated in whole or in part by artificial intelligence and may not have been reviewed or fact checked by human editors. While we make reasonable efforts to ensure the quality and accuracy of the content, we make no representations or warranties, express or implied, as to the truthfulness, reliability, completeness, or timeliness of any information provided. It is your sole responsibility to independently verify any facts, statements, or claims prior to acting upon them. Ainvest Fintech Inc expressly disclaims all liability for any loss, damage, or harm arising from the use of or reliance on AI-generated content, including but not limited to direct, indirect, incidental, or consequential damages.
You Can Understand News Better with AI.
Whats the News impact on stock market?
Its impact is
fork
logo
AInvest
Aime Coplilot
Invest Smarter With AI Power.
Open App