• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers deploy malicious npm packages to steal solana wallet keys

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

You are here: Home / General Cyber Security News / Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP
January 20, 2025

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems.

The list of identified packages is below –

  • @async-mutex/mutex, a typosquat of async-mute (npm)
  • dexscreener, which masquerades as a library for accessing liquidity pool data from decentralized exchanges (DEXs) and interacting with the DEX Screener platform (npm)
  • solana-transaction-toolkit (npm)
  • solana-stable-web-huks (npm)
  • cschokidar-next, a typosquat of chokidar (npm)
  • achokidar-next, a typosquat of chokidar (npm)
  • achalk-next, a typosquat of chalk (npm)
  • csbchalk-next, a typosquat of chalk (npm)
  • cschalk, a typosquat of chalk (npm)
  • pycord-self, a typosquat of discord.py-self (PyPI)

Cybersecurity

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Supply chain security company Socket, which discovered the packages, said the first four packages are designed to intercept Solana private keys and transmit them through Gmail’s Simple Mail Transfer Protocol (SMTP) servers with the likely goal of draining victims’ wallets.

Particularly, the packages solana-transaction-toolkit and solana-stable-web-huks programmatically deplete the wallet, automatically transferring up to 98% of its contents to an attacker-controlled Solana address, while claiming to offer Solana-specific functionality.

“Because Gmail is a trusted email service, these exfiltration attempts are less likely to be flagged by firewalls or endpoint detection systems, which treat smtp.gmail.com as legitimate traffic,” security researcher Kirill Boychenko said.

Socket said it also came across two GitHub repositories published by the threat actors behind solana-transaction-toolkit and solana-stable-web-huks that purport to contain Solana development tools or scripts for automating common DeFi workflows, but, in reality, import the threat actor’s malicious npm packages.

Malicious npm Packages

The GitHub accounts associated with these repositories, “moonshot-wif-hwan” and “Diveinprogramming,” are no longer accessible.

“A script in the threat actor’s GitHub repository, moonshot-wif-hwan/pumpfun-bump-script-bot, is promoted as a bot for trading on Raydium, a popular Solana-based DEX, but instead it imports malicious code from solana-stable-web-huks package,” Boychenko said.

The use of malicious GitHub repositories illustrates the attackers’ attempts to stage a broader campaign beyond npm by targeting developers who might be searching for Solana-related tools on the Microsoft-owned code hosting platform.

The second set of npm packages have been found to take their malicious functionality to the next level by incorporating a “kill switch” function that recursively wipes all files in project-specific directories, in addition to exfiltrating environment variables to a remote server in some cases.

The counterfeit csbchalk-next package functions identically to the typosquatted versions of chokidar, the only difference being that it only initiates the data deletion operation after it receives the code “202” from the server.

Cybersecurity

Pycord-self, on the other hand, singles out Python developers looking to integrate Discord APIs into their projects, capturing Discord authentication tokens and connecting to an attacker-controlled server for persistent backdoor access post installation on both Windows and Linux systems.

The development comes as bad actors are targeting Roblox users with fraudulent libraries engineered to facilitate data theft using open-source stealer malware such as Skuld and Blank-Grabber. Last year, Imperva revealed that Roblox players on the lookout for game cheats and mods have also been targeted by bogus PyPI packages that trick them into downloading the same payloads.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «tiktok goes dark in the u.s. as federal ban takes TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025
Next Post: Product Walkthrough: How Satori Secures Sensitive Data From Production to AI product walkthrough: how satori secures sensitive data from production to ai»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.