Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»New npm Malware Campaign Redirects Victims to Crypto Sites
New npm Malware Campaign Redirects Victims to Crypto Sites
Security

New npm Malware Campaign Redirects Victims to Crypto Sites

February 5, 2026No Comments3 Mins Read

A new malware campaign built around seven npm packages has been uncovered by cybersecurity experts.

The campaign, observed by the Socket Threat Research Team, is operated by a threat actor known as dino_reborn. It uses a mix of cloaking tools, anti-analysis controls and fake crypto-exchange CAPTCHAs to identify whether a visitor is a potential victim or a security researcher.

Six of the packages contain nearly identical 39 KB malware samples, while a seventh constructs a façade webpage.

All seven remained live until takedown requests placed them into security holding. The packages include signals-embed, dsidospsodlks, applicationooks21, application-phskck, integrator-filescrypt2025, integrator-2829 and integrator-2830.

How the Campaign Operated

Each malicious package executed automatically through an IIFE and immediately began collecting a detailed fingerprint of the visiting device. Thirteen data points were gathered, ranging from user agent to language settings. These details were then forwarded through a proxy to the Adspect API, a traffic-cloaking service.

If the Adspect API decided the visitor is a security researcher, the code displayed a “white page” constructed from static assets. If it determined the visitor is a victim, a fake CAPTCHA branded with standx.com, jup.ag or uniswap.org appeared. After a brief delay, the CAPTCHA redirected the victim to a malicious URL supplied by Adspect.

Read more on crypto-focused threat campaigns: New NCA Campaign Warns Men Off Crypto Investment Scams

The malware packages and the façade webpage communicated using shared container IDs. Signals-embed builds the white page that researchers saw, while fallback code inside the malware reconstructed a branded Offlido page if the network failed. Anti-analysis features blocked right-click, F12, Ctrl+U and detected open DevTools, causing the page to reload.

See also  Crypto Crime Hit All-Time High in 2025, With Russian Stablecoin Playing Key Role: TRM Labs

Key indicators of this campaign include:

  • Use of /adspect-proxy.php and /adspect-file.php paths

  • JavaScript that disables user interactions

  • Dynamic redirects tied to Adspect stream IDs

Outlook and Defensive Guidance

Socket researchers said this campaign merges open source distribution with techniques traditionally seen in malvertising operations. Because Adspect returns fresh redirect URLs on each request, payloads can shift rapidly. 

“Defenders should expect continued abuse of Adspect-style cloaking and proxy infrastructure in browser-executed open source packages. These tactics will likely reappear with new brand façades and new package names,” the security experts warned.

“Web teams should treat unexpected scripts that disable user interactions or that post detailed client fingerprints to unfamiliar PHP endpoints as immediate red flags. Network defenders should monitor for /adspect-proxy.php and /adspect-file.php paths across any domains, as these serve as reliable indicators of this actor’s toolkit.”

Source link

Campaign Crypto Malware npm Redirects sites victims

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Brazil's central bank bans stablecoin and crypto settlement in cross-border payments

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026
Top Posts

What It Means for Shiba Inu

September 24, 2023

Nearly 2 Billion People In The World Don’t See Climate Change As A Threat

November 4, 2023

CryptoPunks 2026 Price Forecast: Whales, Signals & What Comes Next

February 21, 2026

Type above and press Enter to search. Press Esc to cancel.