Hijacking wallets with malicious patches.
This week, we are joined by Lucija Valentić (https://www.linkedin.com/in/lucija-valenti%C4%87-731975210/) , Software Threat Researcher from ReversingLabs (https://www.linkedin.com/company/reversinglabs/) , who is discussing "Atomic and Exodus crypto wallets targeted in malicious npm campaign." Threat actors have launched a malicious npm campaign targeting Atomic and Exodus crypto wallets by distributing a fake package called "pdf-to-office," which secretly patches locally installed wallet software to redirect crypto transfers to attacker-controlled addresses.
ReversingLabs researchers discovered that this package used obfuscated JavaScript to trojanize specific files in targeted wallet versions, enabling persistence even after the malicious package was removed. This incident highlights the growing threat of software supply chain attacks in the cryptocurrency space and underscores the need for vigilant monitoring of both open-source repositories and local applications.
The research can be found here:
•
(https://www.cyberark.com/resources/threat-research-blog/agents-under-attack-threat-modeling-agentic-ai) Atomic and Exodus crypto wallets targeted in malicious npm campaign (https://www.reversinglabs.com/blog/atomic-and-exodus-crypto-wallets-targeted-in-malicious-npm-campaign)
Learn more about your ad choices. Visit megaphone.fm/adchoices (https://megaphone.fm/adchoices)