Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Hacker targets ETH and SOL devs via typosquat npm packages
Security

Hacker targets ETH and SOL devs via typosquat npm packages

March 28, 2026No Comments3 Mins Read

Ethereum and Solana developers were targeted by five malicious npm packages that steal private keys and send them to the attacker. The packages rely on typosquatting, mimicking legitimate crypto libraries.

Security researchers from Socket found the five malicious npm packages published under a single account. The malicious campaign covers the Ethereum and Solana ecosystems, with active command and control (C2) infrastructure.

One of the packages was unpublished within five minutes, but it hid its code and sent stolen data to the attacker.

Hackers target Ethereum and Solana devs

Crypto hackers do not only target retail investors and the elderly. They rely on social engineering tactics and typosquatting to trick developers and steal their crypto.

Typosquatting is a tactic where attackers create fake packages with names similar to popular libraries. Developers may accidentally install these malicious packages, thinking they are legitimate.

The job of the malicious packages is to divert keys to a hardcoded Telegram bot.

The malicious npm attack works by hooking functions that developers use to pass private keys. When a function is called, the package sends the key to the attacker’s Telegram bot before returning the expected result. This makes the attack invisible to the unaware devs.

According to security researchers, four packages target Solana developers, while one targets Ethereum developers.

Malicious npm packages vs. legitimate crypto libraries. Source: Socket.

The four packages targeting Solana intercept Base58 decode() calls, while the ethersproject-wallet package targets the Ethereum Wallet constructor.

All of the malicious packages rely on global fetch, which requires Node.js 18 or later. On older versions, the request fails silently, and no data is stolen.

See also  BNB Smart Chain scam losses dropped 75% in Q3: Report

All packages send data to the same Telegram endpoint. The bot token and chat ID are hardcoded in every package, and there is no external server, so the channel works as long as the Telegram bot stays online.

The raydium-bs58 package is the simplest. It modifies a decode function and sends the key before returning the result. The README is copied from a legitimate SDK, and the author field is empty.

The second Solana package, base-x-64, hides the payload with obfuscation. The payload sends a message to Telegram with the stolen key.

The bs58-basic package contains no malicious code itself but it depends on base-x-64 and passes the payload through the chain.

The Ethereum package, ethersproject-wallet package, copies a real library, @ethersproject/wallet. The malicious package inserts one extra line after compilation. The change appears only in the compiled file, which confirms manual tampering.

All packages share the same command endpoint, typos, and build artifacts. Two packages use identical compiled files. Another package depends directly on the other. These links point to a single actor using the same workflow.

Takedown requests have been submitted to npm by security researchers. Private keys lost to this attack are compromised and any associated funds should be moved quickly to a new wallet.

Hackers continue to target crypto devs. According to Cryptopolitan, hackers managed to infect 178 macOS devs through a fake OpenClaw installer. The fake installer, dubbed GhostClaw was listed on the npm registry for a while before being removed. It was designed to steal private keys, seed phrases, and other sensitive data.

See also  CEO Confirms Funds Safe Following Devastating Drift Protocol Hack

Source link

devs ETH Hacker npm Packages SOL Targets typosquat

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026
Top Posts

Bitcoin bulls scramble for post-quantum protection as Google drops bombshell paper

April 1, 2026

Elixir Protocol secures $7.5 million Series A funding at $100 million valuation

October 19, 2023

Bitfinex Customers Targeted in Phishing Attacks After Support Agent Hack

November 6, 2023

Type above and press Enter to search. Press Esc to cancel.