CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

Moralis Money
Cryptopolitan 2025-04-13 13:20:35

Threat actors are injecting malicious codes into legitimate crypto projects

Malicious actors are now injecting malicious codes into legitimate projects to steal digital assets from unsuspecting users. According to reports, cybersecurity researchers have uncovered a sophisticated malware campaign that is targeting crypto users through compromised npm packages. According to the report, the attack specifically targets users of the Atomic and Exodus wallets, with the attacker hijacking transactions by injecting malicious codes that redirect funds to the attacker’s wallet. The latest campaign is in line with the ongoing chain of attacks against crypto users through software supply chain attacks. The origin of the attack is usually from the developers, with most of them unknowingly installing the compromised npm packages in their projects. One such package identified in this campaign is “pdf-to-office,” which appears normally and looks legitimate but contains hidden malicious codes. After it is installed, the package scans the user’s device for installed crypto wallets and injects the malicious code that is capable of intercepting and redirecting transactions without the user’s knowledge. Cybersecurity researchers flag malicious codes targeting crypto wallets The impact of this attack is very dire for victims, with the malicious codes capable of silently redirecting crypto transactions to the wallets controlled by the attacker. These attacks work across several digital assets, including Ethereum, Solana, XRP, and Tron-based USDT. The malware effectively carries out this attack, switching the wallet addresses from the legitimate one to the attacker-controlled address at the moment that a user wants to send funds. The malicious campaign was discovered by ReversingLabs researchers through their analysis of suspicious npm packages. The researchers mentioned that there are so many tell signs of malicious behaviors including the suspicious URL connections and code patterns similar to previously discovered malicious packages. They mentioned that there have been a number of campaigns that have attempted to use the malicious code this week. They believe that the attackers are using this technique to maintain persistence and evade detection. “Most recently, a campaign launched on April 1 published a package, pdf-to-office, to the npm package manager that posed as a library for converting PDF format files to Microsoft Office documents. When executed, the package injected malicious code into legitimate, locally-installed crypto wallet software Atomic Wallet and Exodus, overwriting existing, non-malicious files in the process,” ReversingLabs said. Infection mechanism and code injection According to technical examination, the attack is multi-stage and begins when a user installs the package. The rest happens when they proceed through wallet identification, file extraction, malicious code injection, and ultimately transaction hijacking. The attackers also use obfuscation techniques to hide their intentions, making it hard for traditional tools to pick it up, making it too late by the time the user discovers. After installation, the infection begins when the malicious package executes its payload targeting installed wallet software. The code identifies the location of the wallet’s application files before targeting the ASAR package format used by Electron-based applications. The code specifically searches for files in paths such as “AppData/Local/Programs/atomic/resources/app.asar”. Once it locates it, the malware extracts the application archive, injects its malicious code, and then rebuilds the archive. The injections specifically target JavaScript files that are inside the wallet software, especially vendor files like “vendors.64b69c3b00e2a7914733.js”. The malware then modifies the transaction handling code to replace the real wallet addresses with the ones belonging to the attacker using the base64 encoding. For example, when a user tries to send Ethereum, the code replaces the recipient address with a decoded version of the address. After the infection is completed, the malware communicates using a command-and-control server, sending installation status information including the user’s home directory path. This allows the attacker to track successful infections and potentially gather information about the compromised systems. According to ReversingLabs, the malicious path has also shown evidence of persistence, with the Web3 wallet on systems still infected even when the package has been removed. Cryptopolitan Academy: Coming Soon - A New Way to Earn Passive Income with DeFi in 2025. Learn More

https://www.digistore24.com/redir/325658/ceobig/
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.