Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

This top VC bets nearly 20% of its money on teenagers – here’s why

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious NPM packages generated by AI will emit Solana funds from over 1,500 before takedowns
Identity

Malicious NPM packages generated by AI will emit Solana funds from over 1,500 before takedowns

userBy userAugust 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 1, 2025Ravi LakshmananMalware/Artificial Intelligence

Cybersecurity researchers have flagged malicious NPM packages generated using artificial intelligence (AI) to hide cryptocurrency wallet drainers.

The package @kodane/patch-manager claims to provide “advanced license verification and registry optimization utility for high-performance node.js applications.” It was uploaded to NPM on July 28, 2025 by a user named “Kodane.” This package is no longer available for download from the registry, but not before it attracts over 1,500 downloads.

The safety of the software supply chain security company that discovered the library said malicious features were promoted directly in the source code and called “enhanced stealth wallet drainers.”

Specifically, the behavior is triggered as part of a post-install script that drops payloads within hidden directories across Windows, Linux and MacOS systems, then connects to the Command and Control (C2) server with “Sweeper-Monitor-Production.up.railway”.[.]App. “

“This script generates a unique machine ID code for the compromised host and shares it with the C2 server,” says Paul McCarty, Secure Research Director, noting that the C2 server lists two compromised machines.

In the NPM ecosystem, post-install scripts are often overlooked attack vectors. It runs automatically after the package is installed. This means you can compromise without having to run the package manually. This creates dangerous blind spots, especially in CI/CD environments where dependencies are routinely updated without direct human reviews.

Identity Security Risk Assessment

Malware is designed to scan the system for the existence of wallet files, and if found, it will drain all funds from the wallet into the hard-coded wallet address of the Solana blockchain.

This is not the first time that cryptocurrency drainers have been identified in an open source repository, but what sets the @Kodane/Patch-Manager apart is a clue that suggests the use of Anthropic’s Claude AI chatbot.

This changes the pattern of emojis as “enhanced” as the existence of emojis, extensive JavaScript console logging messages, well written descriptive comments, Readme.md Markdown files written in a style that matches the Claude-generated Markdown files, and Claude calling code.

The discovery of the NPM package highlights “how they use AI-threatening AI to create more persuasive and dangerous malware.”

The incident also highlights growing concerns in software supply chain security. This security can bypass traditional defenses by making AI-generated packages look clean or useful. This will raise stocks in the package maintainer and security team. Not only malware, we need to monitor the increasingly sophisticated AI-assisted threats that leverage trusted ecosystems like NPM.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleReddit will be integrated with the search interface as it appears to be a search engine
Next Article Attacker violates Microsoft 365 account using fake OAuth app with Tycoon kit
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

This top VC bets nearly 20% of its money on teenagers – here’s why

YouTubers are no longer dependent on ad revenue — how some YouTubers are diversifying

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.