Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

The Hacker News by The Hacker News
January 20, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Jan 20, 2025Ravie LakshmananSupply Chain Attack / Solana

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems.

The list of identified packages is below –

  • @async-mutex/mutex, a typosquat of async-mute (npm)
  • dexscreener, which masquerades as a library for accessing liquidity pool data from decentralized exchanges (DEXs) and interacting with the DEX Screener platform (npm)
  • solana-transaction-toolkit (npm)
  • solana-stable-web-huks (npm)
  • cschokidar-next, a typosquat of chokidar (npm)
  • achokidar-next, a typosquat of chokidar (npm)
  • achalk-next, a typosquat of chalk (npm)
  • csbchalk-next, a typosquat of chalk (npm)
  • cschalk, a typosquat of chalk (npm)
  • pycord-self, a typosquat of discord.py-self (PyPI)
Cybersecurity

Supply chain security company Socket, which discovered the packages, said the first four packages are designed to intercept Solana private keys and transmit them through Gmail’s Simple Mail Transfer Protocol (SMTP) servers with the likely goal of draining victims’ wallets.

Particularly, the packages solana-transaction-toolkit and solana-stable-web-huks programmatically deplete the wallet, automatically transferring up to 98% of its contents to an attacker-controlled Solana address, while claiming to offer Solana-specific functionality.

“Because Gmail is a trusted email service, these exfiltration attempts are less likely to be flagged by firewalls or endpoint detection systems, which treat smtp.gmail.com as legitimate traffic,” security researcher Kirill Boychenko said.

Socket said it also came across two GitHub repositories published by the threat actors behind solana-transaction-toolkit and solana-stable-web-huks that purport to contain Solana development tools or scripts for automating common DeFi workflows, but, in reality, import the threat actor’s malicious npm packages.

Malicious npm Packages

The GitHub accounts associated with these repositories, “moonshot-wif-hwan” and “Diveinprogramming,” are no longer accessible.

“A script in the threat actor’s GitHub repository, moonshot-wif-hwan/pumpfun-bump-script-bot, is promoted as a bot for trading on Raydium, a popular Solana-based DEX, but instead it imports malicious code from solana-stable-web-huks package,” Boychenko said.

The use of malicious GitHub repositories illustrates the attackers’ attempts to stage a broader campaign beyond npm by targeting developers who might be searching for Solana-related tools on the Microsoft-owned code hosting platform.

The second set of npm packages have been found to take their malicious functionality to the next level by incorporating a “kill switch” function that recursively wipes all files in project-specific directories, in addition to exfiltrating environment variables to a remote server in some cases.

The counterfeit csbchalk-next package functions identically to the typosquatted versions of chokidar, the only difference being that it only initiates the data deletion operation after it receives the code “202” from the server.

Cybersecurity

Pycord-self, on the other hand, singles out Python developers looking to integrate Discord APIs into their projects, capturing Discord authentication tokens and connecting to an attacker-controlled server for persistent backdoor access post installation on both Windows and Linux systems.

The development comes as bad actors are targeting Roblox users with fraudulent libraries engineered to facilitate data theft using open-source stealer malware such as Skuld and Blank-Grabber. Last year, Imperva revealed that Roblox players on the lookout for game cheats and mods have also been targeted by bogus PyPI packages that trick them into downloading the same payloads.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Robert & John Limited to Launch groundbreaking MVNO called Liv.ing. XIUS to provide robust Business Support System (BSS) that will enable Liv.ing retail the essentials of life

Robert & John Limited to Launch groundbreaking MVNO called Liv.ing. XIUS to provide robust Business Support System (BSS) that will enable Liv.ing retail the essentials of life

Recommended.

Lowe’s links end-user feedback loop to AI tool improvements

Lowe’s links end-user feedback loop to AI tool improvements

July 17, 2025
VyOS Networks and Vates Announce Strategic Partnership to Develop Advanced Network Solutions for Vates VMS

VyOS Networks and Vates Announce Strategic Partnership to Develop Advanced Network Solutions for Vates VMS

February 4, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio