Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Crypto devs face new threat from Claude-based malware

May 3, 2026

AI agent forms its own company, gets ready to trade crypto

May 3, 2026

Breaking the Loop of Speculation, Leverage, and Inflated Yields

May 3, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Crypto devs face new threat from Claude-based malware
Security

Crypto devs face new threat from Claude-based malware

May 3, 2026No Comments3 Mins Read

An open-source crypto trading project received a malicious npm package called @validate-sdk/v2 after Anthropic’s Claude Opus AI model made it a dependency. This gave hackers access to users’ crypto wallets and funds.

Security researchers from ReversingLabs (RL) found the breach in the openpaw-graveyard project, which is an autonomous crypto trading agent hosted on npm. They called it PromptMink.

The bad commit was made on February 28, 2026. ReversingLabs says that the package pretends to be a tool for checking data but really steals secrets from the host environment.

North Korean hackers linked to PromptMink malware

ReversingLabs said that the attack came from Famous Chollima, a North Korean state-sponsored threat group.

The group has been spreading malicious npm packages since at least September 2025. They have been improving a two-layer strategy that is meant to trick both human devs and AI coding assistants.

The first layer is made up of packages that don’t have any malicious code. These “bait” packages, like @solana-launchpad/sdk and @meme-sdk/trade, seem like real tools for crypto developers.

They list a few second-layer packages that carry the actual payload, along with popular npm packages like axios and bn.js as dependencies.

When the second-layer packages are reported and taken down from npm, the attackers just put in a new one without losing the reputation they’ve built around the bait packages.

ReversingLabs says that when @hash-validator/v2 was taken off of npm, the attackers released @validate-sdk/v2 the same day with the same version number and source code.

AI agents are more susceptible to hacks than humans

Security researchers stated that Famous Chollima’s method seems more suited to taking advantage of AI coding assistants than human developers. The group writes long, detailed documentation for its malicious packages, which researchers call “LLM Optimization abuse.”

See also  OKX Invests in Vietnam Exchange CAEX Ahead of Crypto Pilot – Crypto News Bitcoin News

The goal is to make packages look real enough that AI agents will suggest and install them without any problems. The infected packages were “vibe-coded” by generative AI tools. Leftover LLM responses are visible in the file comments.

Since late 2025, the PromptMink malware has taken on many different forms.

It started as a simple JavaScript infostealer, then grew into big single-executable applications, and now comes as compiled Rust payloads that are made to be stealthy, according to ReversingLabs.

When the malware is installed, it looks for configuration files related to crypto, steals wallet credentials and system information, compresses and sends project source code to itself, and drops SSH keys on Linux and Windows machines so it can always access them remotely.

The PromptMink campaign is not the only recent attack targeting crypto developers through package managers.

Last month, Cryptopolitan reported on GhostClaw, a malware that targeted the OpenClaw community through a fake npm installer. It harvested crypto wallet data, macOS Keychain passwords, and AI platform API tokens from 178 developers before removal from the npm registry.

PromptMink and GhostClaw use social engineering as an entry point and target developers working in crypto and Web3. What makes PromptMink different is that it targets AI coding agents and uses them as the attack path.

Source link

Claudebased Crypto devs face Malware Threat

Related Posts

AI agent forms its own company, gets ready to trade crypto

May 3, 2026

Crypto News Today: AlphaPepe Presale Nears $1.1M Raised Whilst Cardano Price Prediction Targets $5.00

May 3, 2026

Did ZetaChain ignore a bug report that could have prevented $334K exploit?

May 3, 2026

Syndicate Labs suffers $380k SYND bridge exploit, pledges full user compensation

May 3, 2026
Top Posts

Why North Korea keeps stealing billions in crypto — out in the open

April 13, 2026

Ripple turns to AI to stress-test the XRP Ledger as institutional use cases scale

March 28, 2026

How To Lend and Borrow in DeFi

February 6, 2026

Type above and press Enter to search. Press Esc to cancel.