Close Menu
    Facebook X (Twitter) Instagram
    Friday, August 1
    Top Stories:
    • Tesla Hit with $200M Damages Over Fatal Autopilot Crash
    • Google’s Countdown: Two Weeks to Unlock Android
    • Joby Aviation Teams Up with L3Harris to Pioneer Autonomous Hybrid Aircraft
    Facebook X (Twitter) Instagram Pinterest Vimeo
    IO Tribune
    • Home
    • AI
    • Tech
      • Gadgets
      • Fashion Tech
    • Crypto
    • Smart Cities
      • IOT
    • Science
      • Space
      • Quantum
    • OPED
    IO Tribune
    Home » Crypto Malware Steals ETH, XRP, and SOL from Wallets!
    Crypto

    Crypto Malware Steals ETH, XRP, and SOL from Wallets!

    Staff ReporterBy Staff ReporterApril 13, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Quick Takeaways

    1. Targeted Malware Campaign: Cybersecurity researchers reveal a malware campaign primarily targeting Ethereum, XRP, and Solana users, particularly through compromised npm packages like "pdf-to-office."

    2. Transaction Redirection: The malware stealthily redirects transactions to attacker-controlled addresses, operating without the user’s awareness, highlighting a significant escalation in software supply chain attacks on cryptocurrency.

    3. Advanced Obfuscation: Researchers from ReversingLabs identified the malware’s multi-stage attack process, which employs advanced obfuscation techniques to evade detection, including modifying transaction handling code.

    4. Stealthy Compromise: Despite appearing normal in wallet interfaces, transactions are compromised, with funds sent to attackers, leaving users unaware until they verify the blockchain, emphasizing the critical need for vigilance.

    Cybersecurity researchers have recently unveiled a malware campaign that targets cryptocurrencies like Ethereum (ETH), XRP (XRP), and Solana (SOL). This attack focuses primarily on users of Atomic and Exodus wallets. Notably, it employs compromised node package manager (NPM) packages to execute its malicious actions.

    Initially, developers unwittingly install trojanized NPM packages while working on their projects. Researchers pinpointed a package called “pdf-to-office” as seemingly legitimate, yet it harbors hidden malicious code. Subsequently, once this package is installed, it scans the system for cryptocurrency wallets, injecting malicious code to intercept transactions.

    “This latest campaign represents an escalation in the ongoing targeting of cryptocurrency users through software supply chain attacks,” experts note. The malware adeptly redirects transactions across various cryptocurrencies, including Tron-based USDT.

    ReversingLabs identified this threat through careful analysis of suspicious npm packages, spotting indicators like dubious URL connections and code reflecting known threats. Their investigation exposed a multi-stage attack utilizing advanced obfuscation techniques, cleverly hiding its presence.

    The infection kicks off when the compromised package executes its payload, specifically targeting installed wallet software. The malware then identifies application files using specific paths. Once it locates these files, it extracts and modifies them through a complex process, disguising its malicious intentions.

    This malware alters transaction handling processes to replace genuine wallet addresses with those controlled by attackers, utilizing base64 encoding for maximum stealth. When a user attempts to send ETH, for instance, the malware redirects the transaction to an attacker’s address hidden within coded strings.

    The repercussions can be devastating. Users remain unaware of compromised transactions, as everything appears normal within their wallet interfaces. This lack of visual indicators leaves users shocked when they verify the blockchain later and discover their funds directed to unexpected destinations.

    As cryptocurrency technology continues to evolve, so do the threats that accompany it. Users must remain vigilant and exercise caution when installing software. Enhancing cybersecurity measures and increasing awareness can significantly reduce risks in an increasingly complex digital landscape.

    Discover More Technology Insights

    Stay informed on the revolutionary breakthroughs in Quantum Computing research.

    Explore past and present digital transformations on the Internet Archive.

    Disclaimer

    This content is for informational and entertainment purposes only and does not constitute financial or investment advice. Cryptocurrency is highly speculative and carries significant risk, including the potential loss of your entire investment. Do not make financial decisions based on this information. Consult a licensed financial advisor before investing. This site does not offer, sell, or advise on cryptocurrency, securities or other regulated financial products in compliance with SEC and applicable laws. Please do your own research and seek professional advise.

    CryptoV1

    Crypto Cryptocurrency DeFi VT1
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleUnveiling the Past: Cambrian Fossils Illuminate Arthropod Evolution
    Next Article Echoes of the Green: Unveiling the Sahara’s Lush Past
    Avatar photo
    Staff Reporter
    • Website

    John Marcelli is a staff writer for IO Tribune, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

    Related Posts

    IOT

    Top Internet Speed Tests: August 2025

    August 1, 2025
    Crypto

    Ripple (XRP) Resilient Amid Altcoin Decline

    August 1, 2025
    Tech

    Tesla Hit with $200M Damages Over Fatal Autopilot Crash

    August 1, 2025
    Add A Comment

    Comments are closed.

    Must Read

    Top Internet Speed Tests: August 2025

    August 1, 2025

    Ripple (XRP) Resilient Amid Altcoin Decline

    August 1, 2025

    Tesla Hit with $200M Damages Over Fatal Autopilot Crash

    August 1, 2025

    Nothing Phone 3 Review: Close, But No Flagship

    August 1, 2025

    Google’s Countdown: Two Weeks to Unlock Android

    August 1, 2025
    Categories
    • AI
    • Crypto
    • Fashion Tech
    • Gadgets
    • IOT
    • OPED
    • Quantum
    • Science
    • Smart Cities
    • Space
    • Tech
    • Technology
    Most Popular

    Tether Aids DOJ in $225M Stablecoin Seizure from ‘Pig Butchering’ Scam

    June 19, 2025

    Phantom X Launching on PC and Mobile Next Month!

    May 15, 2025

    Health Risks of Starch-Based Microplastics Revealed in Mice

    April 13, 2025
    Our Picks

    Boosting Canada’s Quantum Future: New Funding Unleashed

    March 26, 2025

    Sink or Swim: Ancient Histories Shape Tectonic Plates Fate

    April 12, 2025

    AI Reveals Urban Green Gaps: Mapping Environmental Inequities

    February 23, 2025
    Categories
    • AI
    • Crypto
    • Fashion Tech
    • Gadgets
    • IOT
    • OPED
    • Quantum
    • Science
    • Smart Cities
    • Space
    • Tech
    • Technology
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About Us
    • Contact us
    Copyright © 2025 Iotribune.comAll Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.