Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP: A Threat Assessment



Hackers have deployed malicious npm packages designed to steal sensitive data from infected systems, including Solana wallet keys via Gmail SMTP. These packages pose a significant threat to developers who use third-party repositories like npm and PyPI. To stay safe, it is essential for them to be cautious when installing new packages on their systems.

  • Malicious npm packages have been discovered, designed to steal sensitive data including Solana wallet keys.
  • Three sets of malicious packages were found across npm and PyPI repositories with capabilities to steal data and delete sensitive files.
  • The packages use typosquats to trick developers into installing them, often evading detection systems due to their connection to trusted email services like Gmail.
  • One package deletes all project-specific files, while another captures Discord authentication tokens for persistent backdoor access.



  • The cybersecurity world has been rocked by a recent discovery of malicious npm packages designed to steal sensitive data, including Solana wallet keys. According to a report by Supply Chain Attack/Solana, researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems.

    The list of identified packages includes @async-mutex/mutex, dexscreener, solana-transaction-toolkit, solana-stable-web-huks, cschokidar-next, achokidar-next, achalk-next, csbchalk-next, and pycord-self. These malicious packages were found to have typosquats that could trick unsuspecting developers into installing them on their systems.

    The first four packages, namely @async-mutex/mutex, dexscreener, solana-transaction-toolkit, and solana-stable-web-huks, are designed to intercept Solana private keys and transmit them through Gmail's Simple Mail Transfer Protocol (SMTP) servers. This could potentially drain victims' wallets.

    One of the most concerning aspects of these packages is that they use the trustworthiness of Gmail as a means of evading detection systems. As Kirill Boychenko, a security researcher, explained, "Because Gmail is a trusted email service, these exfiltration attempts are less likely to be flagged by firewalls or endpoint detection systems, which treat smtp.gmail.com as legitimate traffic."

    Moreover, the packages also come with a kill switch function that recursively wipes all files in project-specific directories. In addition to this, some of the packages may exfiltrate environment variables to a remote server.

    The counterfeit csbchalk-next package functions identically to the typosquatted versions of chokidar, the only difference being that it only initiates the data deletion operation after receiving the code "202" from the server. This highlights the complexity and sophistication of these malicious packages.

    On the other hand, pycord-self is designed to capture Discord authentication tokens and connect to an attacker-controlled server for persistent backdoor access post installation on both Windows and Linux systems. This makes it a significant threat to developers who use Python in their projects.

    In recent times, there have been numerous instances of bad actors targeting Roblox users with fraudulent libraries engineered to facilitate data theft using open-source stealer malware such as Skuld and Blank-Grabber. However, this latest attack highlights the need for developers to be cautious when using third-party packages from repositories like npm and PyPI.

    In conclusion, these malicious npm packages pose a significant threat to developers who use Solana wallets and other services that integrate with the internet. It is essential for them to remain vigilant and take necessary precautions to protect themselves against such threats.



    Related Information:

  • https://thehackernews.com/2025/01/hackers-deploy-malicious-npm-packages.html


  • Published: Mon Jan 20 00:10:03 2025 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us