node Plans that are nine-years-old are hacked to obfuscate API keys.

On March 28, 2025, Raviole LakshmananCryptocurrency / Developer Security

On the npm registry, cybersecurity researchers have discovered some cryptocurrency packages that have been hacked to steal sensitive data, including , from affected systems.

Some of these deals have been hosted on npmjs.com for more than 9 years and offer reasonable efficiency to bitcoin developers, according to Sonatype scientist Ax Sharma. However, the most recent variants of each of these plans were full of opaque scripts.

Below are listed the damaged packages and their seized versions.

  • country-currency-map ( 2.1.8 )
  • bnb-javascript-sdk-nobroadcast ( 2.16.16 )
  • @bithighlander/bitcoin-cash-js-lib ( 5.2.2 )
  • eslint-config-travix ( 6.3.1 )
  • @crosswise-finance1/sdk-v2 ( 0.1.21 )
  • @keepkey/device-protocol ( 7.13.3 )
  • @veniceswap/uikit ( 0.65.34 )
  • @veniceswap/eslint-config-pancake ( 1.6.2 )
  • babel-preset-travix ( 1.2.1 )
  • @travix/ui-themes ( 1.1.5 )
  • @coinmasters/types ( 4.8.16 )

The application supply chain security firm’s analysis of these packages has revealed that they have been poisoned by intensely opaque code in two distinct scripts: “package/scripts/launch.” “package/scripts/diagnostic-report .js” and “package/scripts/report .js” js”.

The JavaScript code runs immediately after the packages are installed and is intended to expend sensitive data, such as API keys, access tokens, and SSH keys, to a remote server ( “eoi2ectd5a5tn1h” ). m. pipedream [. ] net” ).

Ironically, none of the GitHub repositories linked to the books have undergone the same changes, which raises the question of how the campaign’s behindpers managed to push malicious code. What is the campaign’s ultimate objective, as of right now?

We believe that the sabotage was caused by outdated npm maintainer accounts getting compromised, either through token stuffing ( which is where danger actors restart usernames and passwords leaked in past breaches of balances on other sites ) or by an expired domain takeover, according to Sharma.

The first scenario ( maintainer accounts takeover ) appears to be more likely than well-orchestrated phishing attacks because of the concurrent timing of the attacks on multiple projects from different maintainers.

The results highlight the need to use two-factor authentication to secure accounts in order to stop invasion attacks. They also highlight the difficulties that come with enforcing these safety measures when open-source jobs reach the end of life or are no longer constantly maintained.

The case highlights the urgent need for better supply chain security measures and greater attention when monitoring developers ‘ third-party program registry, according to Sharma. To reduce the risks posed by third-party relationships, businesses may promote protection at every stage of the development method.

This article was exciting, did you find it? Follow us on and Twitter to access more unique content we article.

Leave a Comment