Malicious npm Packages: A New Threat to Solana Wallet Security and Developer Ecosystems
Digital Forensics Research and Service Center (DFRSC)
White Collar Crime Investigation | Digital Forensics | Cyber Security | Malware Analysis
Cybersecurity researchers have uncovered a series of malicious npm and PyPI packages designed to steal data, target cryptocurrency wallets, and sabotage developer systems. Among these is a targeted attack on Solana wallet keys, leveraging Gmail’s SMTP servers to exfiltrate sensitive information while bypassing traditional security defenses.
The Malicious Packages
The identified malicious packages span popular repositories, including npm and PyPI, with some specifically targeting Solana wallet users. Notable packages include:
Stealing Solana Wallet Keys
The first set of malicious npm packages, including solana-transaction-toolkit and solana-stable-web-huks, are engineered to intercept Solana private keys. They use Gmail’s SMTP servers to exfiltrate keys and automatically drain up to 98% of a wallet's funds to attacker-controlled addresses.
As Kirill Boychenko, a security researcher, notes:
"Because Gmail is a trusted email service, these exfiltration attempts are less likely to be flagged by firewalls or endpoint detection systems, which treat smtp.gmail.com as legitimate traffic."
The attackers also used GitHub repositories, such as moonshot-wif-hwan/pumpfun-bump-script-bot, to distribute malicious code under the guise of Solana development tools. While these repositories have since been taken down, they highlight a broader campaign targeting developers exploring Solana-related tools.
领英推荐
Expanding Malicious Functionality
Beyond Solana-specific attacks, other malicious packages demonstrate destructive behavior:
Broader Implications for Developers
This campaign is part of a rising trend in supply chain attacks, where trusted platforms like npm and PyPI are exploited to distribute malware. Developers using these repositories for legitimate purposes face the risk of:
The development coincides with other campaigns targeting Roblox users and developers seeking mods or cheats, using counterfeit libraries to deploy open-source stealers like Skuld and Blank-Grabber.
How to Stay Secure
To mitigate these threats, developers and organizations must adopt stringent security measures:
Conclusion
The recent wave of malicious npm and PyPI packages is a stark reminder of the vulnerabilities in modern software supply chains. By exploiting trusted repositories, attackers are increasingly targeting developers, cryptocurrencies, and APIs, with devastating consequences.
Securing supply chains and educating developers about these risks are critical to protecting sensitive data and preventing widespread damage. Staying vigilant and proactive is the only way forward in this evolving threat landscape.