Malicious npm package secretly targets Atomic, Exodus wallets to intercept and reroutes funds

2 months ago

Researchers person discovered a malicious bundle bundle uploaded to npm that secretly alters locally installed versions of crypto wallets and allows attackers to intercept and reroute integer currency transactions, ReversingLabs revealed successful a recent report.

The run injected trojanized codification into locally installed Atomic and Exodus wallet bundle and hijacked crypto transfers. The onslaught centered connected a deceptive npm package, pdf-to-office, which posed arsenic a room for converting PDF files to Office formats.

When executed, the bundle silently located and modified circumstantial versions of Atomic and Exodus wallets connected victims’ machines, redirecting outgoing crypto transactions to wallets controlled by menace actors.

ReversingLabs said the run exemplifies a broader displacement successful tactics: alternatively than straight compromising open-source libraries, which often triggers swift assemblage responses, attackers are progressively distributing packages designed to “patch” section installations of trusted bundle with stealthy malware.

Targeted record patching

The pdf-to-office bundle was archetypal uploaded to npm successful March and updated aggregate times done aboriginal April. Despite its stated function, the bundle lacked existent record conversion features.

Instead, its halfway publication executed obfuscated codification that searched for section installations of Atomic Wallet and Exodus Wallet and overwrote cardinal exertion files with malicious variants.

The attackers replaced morganatic JavaScript files wrong the resources/app.asar archive with near-identical trojanized versions that substituted the user’s intended recipient code with a base64-decoded wallet belonging to the attacker.

For Atomic Wallet, versions 2.90.6 and 2.91.5 were specifically targeted. Meanwhile, a similar method was applied to Exodus Wallet versions 25.9.2 and 25.13.3.

Once modified, the infected wallets would proceed redirecting funds adjacent if the archetypal npm bundle was deleted. Full removal and reinstallation of the wallet bundle were required to destruct the malicious code.

ReversingLabs besides noted the malware’s attempts astatine persistence and obfuscation. Infected systems sent installation presumption information to an attacker-controlled IP code (178.156.149.109), and successful immoderate cases, zipped logs and hint files from AnyDesk distant entree bundle were exfiltrated, suggesting an involvement successful deeper strategy infiltration oregon grounds removal.

Expanding bundle proviso concatenation threats

The find follows a akin March run involving ethers-provider2 and ethers-providerz, which patched the ethers npm bundle to found reverse shells. Both incidents item the rising complexity of proviso concatenation attacks targeting the crypto space.

ReversingLabs warned that these threats proceed to evolve, particularly successful web3 environments wherever section installations of open-source packages are common. Attackers progressively trust connected societal engineering and indirect corruption methods, knowing that astir organizations neglect to scrutinize already installed dependencies.

According to the report:

“This benignant of patching onslaught remains viable due to the fact that erstwhile the bundle is installed and the spot is applied, the menace persists adjacent if the root npm module is removed.”

The malicious bundle was flagged by ReversingLabs’ machine-learning algorithms nether Threat Hunting argumentation TH15502. It has since been removed from npm, but a republished mentation nether the aforesaid sanction and mentation 1.1.2 concisely reappeared, indicating the menace actor’s persistence.

Investigators published hashes of affected files and wallet addresses utilized by the attackers arsenic indicators of compromise (IOCs). These see wallets utilized for illicit money redirection, arsenic good arsenic the SHA1 fingerprints of each infected bundle versions and associated trojanized files.

As bundle proviso concatenation attacks go much predominant and technically refined, particularly successful the integer plus space, information experts are calling for stricter codification auditing, dependency management, and real-time monitoring of section exertion changes.

The station Malicious npm bundle secretly targets Atomic, Exodus wallets to intercept and reroutes funds appeared archetypal connected CryptoSlate.

View source