Close Menu
    Facebook X (Twitter) Instagram
    Friday, August 1
    Top Stories:
    • Celebrating Figma’s IPO: Insights from Will Griffith on Investor Reactions
    • Today Only: Get 38% Off the Google Pixel Tablet!
    • Google’s App Store Overhaul Appeal Denied in Epic Games Clash
    Facebook X (Twitter) Instagram Pinterest Vimeo
    IO Tribune
    • Home
    • AI
    • Tech
      • Gadgets
      • Fashion Tech
    • Crypto
    • Smart Cities
      • IOT
    • Science
      • Space
      • Quantum
    • OPED
    IO Tribune
    Home » Crypto Malware Steals ETH, XRP, and SOL from Wallets!
    Crypto

    Crypto Malware Steals ETH, XRP, and SOL from Wallets!

    Staff ReporterBy Staff ReporterApril 13, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Quick Takeaways

    1. Targeted Malware Campaign: Cybersecurity researchers reveal a malware campaign primarily targeting Ethereum, XRP, and Solana users, particularly through compromised npm packages like "pdf-to-office."

    2. Transaction Redirection: The malware stealthily redirects transactions to attacker-controlled addresses, operating without the user’s awareness, highlighting a significant escalation in software supply chain attacks on cryptocurrency.

    3. Advanced Obfuscation: Researchers from ReversingLabs identified the malware’s multi-stage attack process, which employs advanced obfuscation techniques to evade detection, including modifying transaction handling code.

    4. Stealthy Compromise: Despite appearing normal in wallet interfaces, transactions are compromised, with funds sent to attackers, leaving users unaware until they verify the blockchain, emphasizing the critical need for vigilance.

    Cybersecurity researchers have recently unveiled a malware campaign that targets cryptocurrencies like Ethereum (ETH), XRP (XRP), and Solana (SOL). This attack focuses primarily on users of Atomic and Exodus wallets. Notably, it employs compromised node package manager (NPM) packages to execute its malicious actions.

    Initially, developers unwittingly install trojanized NPM packages while working on their projects. Researchers pinpointed a package called “pdf-to-office” as seemingly legitimate, yet it harbors hidden malicious code. Subsequently, once this package is installed, it scans the system for cryptocurrency wallets, injecting malicious code to intercept transactions.

    “This latest campaign represents an escalation in the ongoing targeting of cryptocurrency users through software supply chain attacks,” experts note. The malware adeptly redirects transactions across various cryptocurrencies, including Tron-based USDT.

    ReversingLabs identified this threat through careful analysis of suspicious npm packages, spotting indicators like dubious URL connections and code reflecting known threats. Their investigation exposed a multi-stage attack utilizing advanced obfuscation techniques, cleverly hiding its presence.

    The infection kicks off when the compromised package executes its payload, specifically targeting installed wallet software. The malware then identifies application files using specific paths. Once it locates these files, it extracts and modifies them through a complex process, disguising its malicious intentions.

    This malware alters transaction handling processes to replace genuine wallet addresses with those controlled by attackers, utilizing base64 encoding for maximum stealth. When a user attempts to send ETH, for instance, the malware redirects the transaction to an attacker’s address hidden within coded strings.

    The repercussions can be devastating. Users remain unaware of compromised transactions, as everything appears normal within their wallet interfaces. This lack of visual indicators leaves users shocked when they verify the blockchain later and discover their funds directed to unexpected destinations.

    As cryptocurrency technology continues to evolve, so do the threats that accompany it. Users must remain vigilant and exercise caution when installing software. Enhancing cybersecurity measures and increasing awareness can significantly reduce risks in an increasingly complex digital landscape.

    Discover More Technology Insights

    Stay informed on the revolutionary breakthroughs in Quantum Computing research.

    Explore past and present digital transformations on the Internet Archive.

    Disclaimer

    This content is for informational and entertainment purposes only and does not constitute financial or investment advice. Cryptocurrency is highly speculative and carries significant risk, including the potential loss of your entire investment. Do not make financial decisions based on this information. Consult a licensed financial advisor before investing. This site does not offer, sell, or advise on cryptocurrency, securities or other regulated financial products in compliance with SEC and applicable laws. Please do your own research and seek professional advise.

    CryptoV1

    Crypto Cryptocurrency DeFi VT1
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleUnveiling the Past: Cambrian Fossils Illuminate Arthropod Evolution
    Next Article Echoes of the Green: Unveiling the Sahara’s Lush Past
    Avatar photo
    Staff Reporter
    • Website

    John Marcelli is a staff writer for IO Tribune, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

    Related Posts

    Crypto

    El Salvador Aids Bolivia in Crafting Crypto Regulations

    August 1, 2025
    Tech

    Celebrating Figma’s IPO: Insights from Will Griffith on Investor Reactions

    August 1, 2025
    Gadgets

    Battlefield 6 Launches October 10!

    August 1, 2025
    Add A Comment

    Comments are closed.

    Must Read

    El Salvador Aids Bolivia in Crafting Crypto Regulations

    August 1, 2025

    Celebrating Figma’s IPO: Insights from Will Griffith on Investor Reactions

    August 1, 2025

    Battlefield 6 Launches October 10!

    August 1, 2025

    Elevating Safety: NASA’s Groundbreaking Drop Test for Air Taxis

    August 1, 2025

    Today Only: Get 38% Off the Google Pixel Tablet!

    July 31, 2025
    Categories
    • AI
    • Crypto
    • Fashion Tech
    • Gadgets
    • IOT
    • OPED
    • Quantum
    • Science
    • Smart Cities
    • Space
    • Tech
    • Technology
    Most Popular

    Garmin Triumphs: Vivoactive 6 vs. Apple Watch SE!

    June 28, 2025

    Rapid Life Revival: How Hydrothermal Systems Fueled Recovery After the Dino-Killing Asteroid

    April 9, 2025

    Firefox Users with Crypto: You’re a Target!

    July 5, 2025
    Our Picks

    Google Messages Bug Triggers Auto Emoji Reactions on Images!

    April 9, 2025

    Rediscovering Creativity: The Hidden Magic of Kindle Scribe

    April 22, 2025

    Unlocking the Placenta: A 100-Million-Year Evolutionary Mystery

    July 6, 2025
    Categories
    • AI
    • Crypto
    • Fashion Tech
    • Gadgets
    • IOT
    • OPED
    • Quantum
    • Science
    • Smart Cities
    • Space
    • Tech
    • Technology
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About Us
    • Contact us
    Copyright © 2025 Iotribune.comAll Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.