NPM attacks surge: Are hackers finding new ways to exploit crypto wallets?

NP package

Hackers are taking their charge, attempting to exploit every nook and cranny of the blockchain technology. When compared to other systems, blockchain has protective layers and smart contracts that are resistant to hackers’ tricks. However, things can sometimes change; hackers continually seek new methods to exploit crypto wallet addresses and steal money. 

Hackers target NPM packages

NPM attacks NPM (Node Package Manager), a huge public library of open-source JavaScript source code, have been frequently targeted by hackers. Adding to the latest list, an NPM account was reportedly compromised to inject malicious code into widely used packages. And the malicious code injected into popular NPM packages is designed to tamper with wallet addresses during transactions. 

Hackers have exploited popular JavaScript libraries, including strip-ansi and chalks, which were downloaded billions of times.

1 billion downloads of malicious code!

That’s quite a painful moment! According to a crypto YouTuber, hackers have recently compromised an NPM account, using which they injected malicious code into “widely used packages”. Since these source code packages are widely used by developers and companies, the malicious code can quickly spread across the ecosystem.  

Join our newsletter
Get Altcoin insights, Degen news and Explainers!

The developers unknowingly downloaded a package containing malicious code, and it has been downloaded over one billion times!  

How is crypto affected by the malicious code on NPM?

  • A developer building a crypto wallet app or DeFi sites unknowingly downloads the compromised package and installs it. 
  • The malicious package automatically executes malicious code when the crypto app runs. 
  • The infected code can spread across the developer’s machine and finally move into the final app. 
  • Now, when a user signs into the crypto app, the app could ship the source code/ JavaScript into their browser.
  • When the user copies a crypto wallet address, it may not be the intended one—instead, the attacker’s address is silently used.    

NPM packages target Ethereum smart contracts

Blockchain research platform, ReversingLabs, recently noticed that smart contracts on Ethereum are being exploited to run malware on compromised devices. Two NPM packages abused the crypto contracts to disguise malicious commands that “installed downloader malware on compromised systems”. 

Although NPM package attacks are doubling up, developers can practice several methods to protect their platforms against these malicious campaigns. They can conduct regular malware and vulnerability scans, verify signatures during package installation, and review packages with install scripts.  

Disclaimer:
This article is for informational purposes only and does not constitute financial, investment, or trading advice. Cryptocurrency investments are subject to high market risk. Readers should conduct their own research or consult with a financial advisor before making any investment decisions. The views expressed here do not necessarily reflect those of the publisher.

Share this article