Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Sneaky NPM Packages Are Stealing Your Ethereum Keys
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Sneaky NPM Packages Are Stealing Your Ethereum Keys
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Sneaky NPM Packages Are Stealing Your Ethereum Keys

Security

Sneaky NPM Packages Are Stealing Your Ethereum Keys

Malicious npm packages are once again being used to steal Ethereum private keys and hijack SSH access.

Marco Rizal
Last updated: October 24, 2024 5:02 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Sneaky NPM Packages Are Stealing Your Ethereum Keys
SHARE
  • Phylum flagged malicious npm packages targeting Ethereum wallets.
  • Attackers aim to steal private keys and SSH access via npm libraries.
  • The malicious libraries disguise themselves as legitimate, fooling developers.

Security firm Phylum has identified multiple npm packages that attempt to steal sensitive Ethereum private keys and hijack SSH access.

These packages, disguised as legitimate libraries, were recently discovered attempting to install the attacker's SSH public key on a victim's machine, resulting in unauthorized access.

The findings were published in a recent security report, alerting developers to the growing risks posed by malicious npm libraries.

This new wave of attacks is similar to a case from August 2023, when a trojanized npm package called “ethereum-cryptographyy” was discovered stealing Ethereum keys.

In that case, the attackers replaced a valid cryptographic package dependency with a malicious one that included a remote server POST request to steal private keys.

According to Phylum's report, the new attack takes a slightly different approach, concealing itself more effectively and exploiting developers' trust in familiar libraries such as ethers, a popular tool with over 1.3 million downloads per week.

The malicious code was discovered within a seemingly benign library called “ethers-mew,” which closely resembles the original ethers library.

The attacker predicted that developers would unknowingly include this bogus version in their projects.

When the compromised library is used to create an Ethereum wallet, the malicious code takes over, silently executing a script to exfiltrate private keys to a server registered under the deceptive domain “ether-sign[.]com,” according to Phylum's investigation.

A quick whois search revealed that the domain was recently registered, indicating that this is a new attack.

The damage does not stop there. While tracing the malware's code, Phylum discovered another trick hidden within the library: the ability to change the victim's root SSH files.

When a developer uses the npm package, the attacker's SSH key is added to the root user's authorized_keys file, effectively transferring control of the machine.

“It's an elaborate attack that's hidden in plain sight,” a Phylum analyst said. The malicious functions, named “checkAddress” and “checkServer,” make the code appear legitimate, complicating detection.

Phylum's detailed code analysis revealed how deeply the malware is embedded across multiple JavaScript files.

The seemingly innocent “checkAddress” function turns out to be a gateway for sending private keys to the attacker's server.

Another function, “superSignKey,” handles the SSH access attack by appending the attacker's public key to the root account, which grants full machine access.

The npm packages linked to this attack have been removed, but developers who used them should check their systems for signs of compromise.

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Grayscale Dogecoin ETF Makes Historic NYSE Trading Debut

November 24, 2025

Breaking: FBI Probes Cardano Network Split After Malicious Transaction

November 24, 2025

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

You might also like

BadPack Malware Sneaks Past Android Security With Manipulation Tricks

BadPack Malware Sneaks Past Android Security With Manipulation Tricks

Mexican City Breached

City in Mexico Breached with Government Systems Compromised

GrimResource Malware Hits Chinese Government and Business Computers

GrimResource Malware Hits Chinese Government and Business Computers

ShinyHunters Strike Again 100 Upcoming Ticketmaster Events E Tickets Leaked

ShinyHunters Strike Again; 100 Upcoming Ticketmaster Events E-Tickets Leaked

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?