The post Cybersecurity researchers uncover fake Bitcoin npm packages that steal crypto wallets and seeds  appeared on BitcoinEthereumNews.com. Researchers at ZscalerThe post Cybersecurity researchers uncover fake Bitcoin npm packages that steal crypto wallets and seeds  appeared on BitcoinEthereumNews.com. Researchers at Zscaler

Cybersecurity researchers uncover fake Bitcoin npm packages that steal crypto wallets and seeds

Researchers at Zscaler ThreatLabz have found three malicious Bitcoin npm packages that are meant to implant malware named NodeCordRAT. Reports say that they all got more than 3,400 downloads before they were taken down from the npm registry.

The packages, which include bitcoin-main-lib, bitcoin-lib-js, and bip40, had amassed 2,300, 193, and 970 downloads. By copying names and details from real Bitcoin components, the attacker made these lookalike modules appear harmless at a glance.

“The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload,” Zscaler ThreatLabz researchers Satyam Singh and Lakhan Parashar said. “This final payload, named NodeCordRAT by ThreatLabz, is a remote access trojan (RAT) with data-stealing capabilities.”

NodeCordRAT is equipped to steal Google Chrome credentials

Zscaler ThreatLabz analysts identified the trio in Nov while scanning the npm registry for suspicious packages and strange download patterns. NodeCordRAT represents a new malware family that leverages Discord servers for command-and-control (C2) communication.

NodeCordRAT was built to steal Google Chrome login information, API codes kept in.env files, and MetaMask wallet data like private keys and seed phrases. The person who posted all three malicious packages used the email address [email protected].

The attack chain begins when developers unknowingly install bitcoin-main-lib or bitcoin-lib-js from npm. Then it identifies the path of the bip40 package and starts it in detached mode using PM2.

The attack flow. Source: Zscaler ThreatLabz

The malware generates a unique identifier for compromised machines using the format platform-uuid, such as win32-c5a3f1b4. It achieves this by extracting system UUIDs through commands like wmic csproduct get UUID on Windows or reading /etc/machine-id on Linux systems.

Malicious node packages that caused crypto thefts

Trust Wallet said that the theft of almost $8.5 million was connected to an attack on the npm ecosystem supply chain by “Sha1-Hulud NPM.” More than 2,500 wallets were affected.

Hackers used a hacked npm as NodeCordRAT-style trojans and supply chain malware. It was incorporated into client-side code that stole money from customers when they accessed their wallets.

Other 2025 examples that fall into two buckets that resemble the NodeCordRAT style threat include the Force Bridge exploit, which occurred between May and June 2025.  Attackers stole either the software or the private keys that validator nodes used to authorize cross-chain withdrawals. This turned nodes into malicious actors that could approve fraudulent transactions.

This breach resulted in an estimated $3.6 million in stolen assets, including ETH, USDC, USDT, and other tokens. It also forced the bridge to stop operations and conduct audits.

In September, the Shibarium Bridge exploit unfolded, and attackers were able to take control of most of the validator power for a short time. As revealed by Cryptopolitan, this let them serve as bad validator nodes, sign off on illegal withdrawals, and take around $2.8 million in SHIB, ETH, and BONE tokens.

Get seen where it counts. Advertise in Cryptopolitan Research and reach crypto’s sharpest investors and builders.

Source: https://www.cryptopolitan.com/researchers-uncover-fake-bitcoin-npm-package/

Market Opportunity
Moonveil Logo
Moonveil Price(MORE)
$0.001414
$0.001414$0.001414
-6.85%
USD
Moonveil (MORE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Vitalik Buterin Withdraws 16,384 ETH to Fund Open-Source Technology and Privacy Projects

Vitalik Buterin Withdraws 16,384 ETH to Fund Open-Source Technology and Privacy Projects

TLDR: Buterin withdrew 16,384 ETH to personally fund open-source projects as Ethereum Foundation reduces spending.  The initiative supports secure hardware, privacy
Share
Blockonomi2026/01/30 16:39
What is the most promising crypto right now? A practical checklist

What is the most promising crypto right now? A practical checklist

Crypto interest often spikes after headlines. This guide helps everyday readers turn curiosity into repeatable checks that limit obvious execution risks. We focus
Share
Coinstats2026/01/30 15:52
Inside Upexi’s SOL play: staking yield and locked token deals

Inside Upexi’s SOL play: staking yield and locked token deals

The post Inside Upexi’s SOL play: staking yield and locked token deals appeared on BitcoinEthereumNews.com. Upexi is the largest public company holding Solana tokens and uses a SOL strategy to build its holdings and generate additional revenue through staking. In an interview with crypto.news, Upexi CEO Allan Marshall explains why the company executed a large equity private placement to build a crypto treasury, citing MicroStrategy’s playbook and a more accommodating U.S. policy backdrop. Summary Upexi is the largest public holder of Solana, using equity raises to build a SOL treasury and earn staking yield. Upexi CEO Allan Marshall spoke with crypto.news in an interview. Corporate strategy focuses on accretive issuances, staking, and discounted locked SOL purchases, not venture investing. Upexi markets itself as a “new institutional gateway to Solana’s (SOL) speed, scale, and rapidly growing ecosystem.” But it isn’t alone, as it joins a handful of rival companies also building Solana treasuries, while dozens of other public entities are focusing on other coins. Speaking to crypto.news, Marshall discusses strategy and market perception. He notes that Upexi is focused on accretive capital raises, staking, and discounted, locked SOL purchases rather than venture investing. He also discusses how the company measures progress through an “adjusted SOL per share” metric designed to remove timing and leverage effects. We also discuss the company’s risk management strategies, which include a buy-and-hold approach, no hedging, disciplined use of leverage, and custody with qualified providers. The entire interview transcript is below: crypto.news: Upexi is now the largest corporate holder of Solana with over 2 million SOL in treasury. Why did you make such a dramatic shift now? Was there something specific that happened in the past few months that gave you the confidence to commit so heavily to a crypto treasury at this time? Allan Marshall: Upexi did the first large-scale equity private placement to create an altcoin treasury, and there were…
Share
BitcoinEthereumNews2025/09/20 02:51