icon
icon
icon
icon
Upgrade
Upgrade

News /

Articles /

Cybercriminals Target Crypto Wallets via Malware-Laced Software

Coin WorldSunday, Apr 13, 2025 2:22 pm ET
1min read

Cybercriminals have identified a new attack vector, targeting users of Atomic and Exodus wallets through open-source software repositories. The latest wave of exploits involves distributing malware-laced packages to compromise private keys and drain digital assets.

ReversingLabs, a cybersecurity firm, uncovered a malicious campaign where attackers compromised Node Package Manager (NPM) libraries. These libraries, often disguised as legitimate tools like PDF-to-Office converters, carry hidden malware. Once installed, the malicious code executes a multi-phase attack. First, the software scans the infected device for crypto wallets. Then, it injects harmful code into the system. This includes a clipboard hijacker that silently alters wallet addresses during transactions, rerouting funds to wallets controlled by the attackers.

Moreover, the malware also collects system details and monitors how successfully it infiltrated each target. This intelligence allows threat actors to improve their methods and scale future attacks more effectively. Meanwhile, ReversingLabs also noted that the malware maintains persistence. Even if the deceptive package, such as pdf-to-office, is deleted, remnants of the malicious code remain active. To fully cleanse a system, users must uninstall affected crypto wallet software and reinstall from verified sources.

Security experts noted that the scope of the threat highlights the growing software supply chain risks threatening the industry. “The frequency and sophistication of software supply chain attacks that target the cryptocurrency industry are also a warning sign of what’s to come in other industries. And they’re more evidence of the need for organizations to improve their ability to monitor for software supply chain threats and attacks,” ReversingLabs stated.

Ask Aime: How can investors protect themselves from the growing software supply chain risks in the cryptocurrency industry?

In a parallel campaign, researchers reported that cybercriminals uploaded fake microsoft Office installers embedded with malware to SourceForge. These infected files included clipboard hijackers and crypto miners, posing as legitimate software but operating silently in the background to compromise wallets. The incidents highlight a surge in open-source abuse and present a disturbing trend of attackers increasingly hiding malware inside software packages developers trust.

Considering the prominence of these attacks, crypto users and developers are urged to remain vigilant, verify software sources, and implement strong security practices to mitigate growing threats.

Comments

Post
Refresh
Disclaimer: the above is a summary showing certain market information. AInvest is not responsible for any data errors, omissions or other information that may be displayed incorrectly as the data is derived from a third party source. Communications displaying market prices, data and other information available in this post are meant for informational purposes only and are not intended as an offer or solicitation for the purchase or sale of any security. Please do your own research when investing. All investments involve risk and the past performance of a security, or financial product does not guarantee future results or returns. Keep in mind that while diversification may help spread risk, it does not assure a profit, or protect against loss in a down market.
You Can Understand News Better with AI.
Whats the News impact on stock market?
Its impact is
fork
logo
AInvest
Aime Coplilot
Invest Smarter With AI Power.
Open App