Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Cybercriminals Hijacking Popular Crypto Software To Steal Digital Assets From Wallets: Security Researchers

Cybercriminals Hijacking Popular Crypto Software To Steal Digital Assets From Wallets: Security Researchers

Daily HodlDaily Hodl2025/04/13 16:00
By:by Rhodilee Jean Dolor

Security researchers are warning that threat actors are using less noticeable techniques to compromise and steal funds from crypto wallets.

Cybersecurity firm ReversingLabs says that cybercriminals are now uploading malicious packages to popular open-source software repositories such as the npm (Node Package Manager).

The objective is to inject malicious code into trusted local libraries without raising suspicion. 

According to ReversingLabs, its research team has identified a new malware campaign targeting crypto users that uses what appears to be a legitimate npm package for converting PDF format files into Microsoft Office documents. 

When executed, the pdf-to-office npm package will inject malicious code into locally-installed Atomic and Exodus crypto wallets and overwrite their existing, non-malicious files to switch the address for outgoing crypto funds. When a compromised user attempts to send crypto assets to another wallet, the funds will be sent to one controlled by the malicious actors.

ReversingLabs says removing the package will not be enough to terminate the malicious activities. 

“The Web3 wallets’ software would remain compromised and continue to channel crypto funds to the attackers’ wallet. The only way to completely remove the malicious trojanized files from the Web3 wallets’ software would be to remove them completely from the computer and re-install them.”

Follow us on X , Facebook and Telegram

Don't Miss a Beat – Subscribe to get email alerts delivered directly to your inbox

Check Price Action

Surf The Daily Hodl Mix


Generated Image: Midjourney

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like