Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Sneaky NPM Packages Are Stealing Your Ethereum Keys
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Sneaky NPM Packages Are Stealing Your Ethereum Keys
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Sneaky NPM Packages Are Stealing Your Ethereum Keys

Security

Sneaky NPM Packages Are Stealing Your Ethereum Keys

Malicious npm packages are once again being used to steal Ethereum private keys and hijack SSH access.

Marco Rizal
Last updated: October 24, 2024 5:02 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Sneaky NPM Packages Are Stealing Your Ethereum Keys
SHARE
  • Phylum flagged malicious npm packages targeting Ethereum wallets.
  • Attackers aim to steal private keys and SSH access via npm libraries.
  • The malicious libraries disguise themselves as legitimate, fooling developers.

Security firm Phylum has identified multiple npm packages that attempt to steal sensitive Ethereum private keys and hijack SSH access.

These packages, disguised as legitimate libraries, were recently discovered attempting to install the attacker's SSH public key on a victim's machine, resulting in unauthorized access.

The findings were published in a recent security report, alerting developers to the growing risks posed by malicious npm libraries.

This new wave of attacks is similar to a case from August 2023, when a trojanized npm package called “ethereum-cryptographyy” was discovered stealing Ethereum keys.

In that case, the attackers replaced a valid cryptographic package dependency with a malicious one that included a remote server POST request to steal private keys.

According to Phylum's report, the new attack takes a slightly different approach, concealing itself more effectively and exploiting developers' trust in familiar libraries such as ethers, a popular tool with over 1.3 million downloads per week.

The malicious code was discovered within a seemingly benign library called “ethers-mew,” which closely resembles the original ethers library.

The attacker predicted that developers would unknowingly include this bogus version in their projects.

When the compromised library is used to create an Ethereum wallet, the malicious code takes over, silently executing a script to exfiltrate private keys to a server registered under the deceptive domain “ether-sign[.]com,” according to Phylum's investigation.

A quick whois search revealed that the domain was recently registered, indicating that this is a new attack.

The damage does not stop there. While tracing the malware's code, Phylum discovered another trick hidden within the library: the ability to change the victim's root SSH files.

When a developer uses the npm package, the attacker's SSH key is added to the root user's authorized_keys file, effectively transferring control of the machine.

“It's an elaborate attack that's hidden in plain sight,” a Phylum analyst said. The malicious functions, named “checkAddress” and “checkServer,” make the code appear legitimate, complicating detection.

Phylum's detailed code analysis revealed how deeply the malware is embedded across multiple JavaScript files.

The seemingly innocent “checkAddress” function turns out to be a gateway for sending private keys to the attacker's server.

Another function, “superSignKey,” handles the SSH access attack by appending the attacker's public key to the root account, which grants full machine access.

The npm packages linked to this attack have been removed, but developers who used them should check their systems for signs of compromise.

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Critical Docker Vulnerability Could Grant Hackers Full Access

Critical Docker Vulnerability Could Grant Hackers Full Access

Nearly Half of US Doctors at Risk Following Alleged Data Leak

Nearly Half of US Doctors at Risk Following Alleged Data Leak

First Fortinet Now Dr.Web When Cybersecurity Companies Get Cyber Attacked

First Fortinet, Now Dr.Web; When Cybersecurity Companies Get Cyber Attacked

Chinese Data Breach

Massive Chinese Data Leaked, From Loans, to Real Estate and More

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?