Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Cybercriminals Exploit Trust in Open Source Plugins to Steal Sensitive Data from Ethereum Developers


Cybercriminals have been exploiting trust in open source plugins on the npm registry to steal sensitive data from Ethereum developers. Researchers have identified several malicious packages impersonating popular development tools, highlighting the need for greater awareness and vigilance among developers. To mitigate these risks, it's essential to verify package authenticity, exercise caution when installing packages, and inspect the source code before installation.

  • Malicious packages impersonating the Nomic Foundation's Hardhat tool have been found on the npm registry, leading to increased cyber attacks targeting Ethereum developers.
  • Attackers exploit trust in open source plugins to infiltrate developer systems and steal sensitive data.
  • Compromised packages collect sensitive details like private keys, mnemonics, and configuration files using functions such as hreInit() and hreConfig().
  • Several malicious packages have been identified on the npm registry, including @nomicsfoundation/hardhat-configure and @nomisfoundation/hardhat-config.
  • A package with 1,092 downloads has harvested mnemonic phrases and private keys from the Hardhat environment.
  • Another package masquerades as a library for detecting vulnerabilities but instead harbors functionality to drop malware.
  • Phony libraries across multiple ecosystems use out-of-band application security testing (OAST) tools to exfiltrate sensitive data.
  • The misuse of OAST tools demonstrates the evolving nature of cyber threats.
  • To mitigate supply chain risks, developers should verify package authenticity, exercise caution when typing package names, and inspect source code before installation.


  • Cybersecurity researchers have recently revealed a concerning trend of malicious packages on the npm registry that have been found impersonating the Nomic Foundation's Hardhat tool. This has led to an increase in cyber attacks targeting Ethereum developers, with attackers exploiting trust in open source plugins to infiltrate developer systems and steal sensitive data.

    The attack begins when compromised packages are installed, which then exploit the Hardhat runtime environment using functions such as hreInit() and hreConfig() to collect sensitive details like private keys, mnemonics, and configuration files. The collected data is then transmitted to attacker-controlled endpoints, leveraging hardcoded keys and Ethereum addresses for streamlined exfiltration.

    According to a recent analysis by Socket research team, several malicious packages have been identified on the npm registry that mimic the Nomic Foundation's Hardhat tool. These packages include @nomicsfoundation/hardhat-configure, installedpackagepublish, @nomisfoundation/hardhat-config, @monicfoundation/hardhat-config, @nomicsfoundation/sdk-test, @nomicsfoundation/web3-sdk, @nomicsfoundation/sdk-test1, crypto-nodes-validator, solana-validator, node-validators, hardhat-deploy-others, hardhat-gas-optimizer, and solidity-comments-extractors.

    One of the packages that has attracted significant attention is @nomicsfoundation/sdk-test, which has garnered 1,092 downloads since its publication over a year ago in October 2023. This package was designed to harvest mnemonic phrases and private keys from the Hardhat environment following installation, with the data being exfiltrated to an attacker-controlled server.

    The Socket research team has also highlighted another malicious npm package named ethereumvulncontracthandler that masquerades as a library for detecting vulnerabilities in Ethereum smart contracts but instead harbors functionality to drop the Quasar RAT malware. This attack highlights the complexity and dependency sprawl within the npm ecosystem, which can make comprehensive security reviews challenging.

    Furthermore, researchers have identified a set of phony libraries across multiple ecosystems, including npm, PyPI, and RubyGems, that leverage out-of-band application security testing (OAST) tools to exfiltrate sensitive data. These packages include adobe-dcapi-web (npm), monoliht (PyPI), chauuuyhhn, nosvemosssadfsd, and holaaaaaafasdf (RubyGems).

    The use of OAST tools for malicious purposes is particularly concerning, as these tools were originally intended to uncover vulnerabilities in web applications. The fact that threat actors are now misusing these tools to steal data, establish command and control channels, and execute multi-stage attacks demonstrates the evolving nature of cyber threats.

    To mitigate the supply chain risks posed by such packages, it's recommended that software developers verify package authenticity, exercise caution when typing package names, and inspect the source code before installation. By taking these steps, developers can significantly reduce their vulnerability to cyber attacks.

    In conclusion, the recent discovery of malicious packages on the npm registry highlights the need for greater awareness and vigilance among Ethereum developers and software developers in general. As the cybersecurity landscape continues to evolve, it's essential that we stay informed about emerging threats and take proactive measures to protect our systems and data.

    Related Information:

  • https://thehackernews.com/2025/01/russian-speaking-attackers-target.html


  • Published: Tue Jan 7 03:06:00 2025 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us