Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Kleiner Perkins has a really good week

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

From the massive offer of meta to the massive assessment of humanity, does AI have ceilings?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious NPM packages generated by AI will emit Solana funds from over 1,500 before takedowns
Identity

Malicious NPM packages generated by AI will emit Solana funds from over 1,500 before takedowns

userBy userAugust 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 1, 2025Ravi LakshmananMalware/Artificial Intelligence

Cybersecurity researchers have flagged malicious NPM packages generated using artificial intelligence (AI) to hide cryptocurrency wallet drainers.

The package @kodane/patch-manager claims to provide “advanced license verification and registry optimization utility for high-performance node.js applications.” It was uploaded to NPM on July 28, 2025 by a user named “Kodane.” This package is no longer available for download from the registry, but not before it attracts over 1,500 downloads.

The safety of the software supply chain security company that discovered the library said malicious features were promoted directly in the source code and called “enhanced stealth wallet drainers.”

Specifically, the behavior is triggered as part of a post-install script that drops payloads within hidden directories across Windows, Linux and MacOS systems, then connects to the Command and Control (C2) server with “Sweeper-Monitor-Production.up.railway”.[.]App. “

“This script generates a unique machine ID code for the compromised host and shares it with the C2 server,” says Paul McCarty, Secure Research Director, noting that the C2 server lists two compromised machines.

In the NPM ecosystem, post-install scripts are often overlooked attack vectors. It runs automatically after the package is installed. This means you can compromise without having to run the package manually. This creates dangerous blind spots, especially in CI/CD environments where dependencies are routinely updated without direct human reviews.

Identity Security Risk Assessment

Malware is designed to scan the system for the existence of wallet files, and if found, it will drain all funds from the wallet into the hard-coded wallet address of the Solana blockchain.

This is not the first time that cryptocurrency drainers have been identified in an open source repository, but what sets the @Kodane/Patch-Manager apart is a clue that suggests the use of Anthropic’s Claude AI chatbot.

This changes the pattern of emojis as “enhanced” as the existence of emojis, extensive JavaScript console logging messages, well written descriptive comments, Readme.md Markdown files written in a style that matches the Claude-generated Markdown files, and Claude calling code.

The discovery of the NPM package highlights “how they use AI-threatening AI to create more persuasive and dangerous malware.”

The incident also highlights growing concerns in software supply chain security. This security can bypass traditional defenses by making AI-generated packages look clean or useful. This will raise stocks in the package maintainer and security team. Not only malware, we need to monitor the increasingly sophisticated AI-assisted threats that leverage trusted ecosystems like NPM.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleReddit will be integrated with the search interface as it appears to be a search engine
Next Article Attacker violates Microsoft 365 account using fake OAuth app with Tycoon kit
user
  • Website

Related Posts

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

August 1, 2025

Cursor AI code editor fixed the flaw that allows attackers to execute commands via SlackMCP

August 1, 2025

Attacker violates Microsoft 365 account using fake OAuth app with Tycoon kit

August 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Kleiner Perkins has a really good week

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

From the massive offer of meta to the massive assessment of humanity, does AI have ceilings?

Tesla is partially liable in Florida Autopilot Trial, ju apprentices award $329 million in damages

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.