Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts

Mar 28, 2025Ravie LakshmananCryptocurrency / Developer Safety

Cybersecurity researchers have found a number of cryptocurrency packages on the npm registry which have been hijacked to siphon delicate info similar to environment variables from compromised programs.

“A few of these packages have lived on npmjs.com for over 9 years, and supply official performance to blockchain builders,” Sonatype researcher Ax Sharma said. “Nevertheless, […] the most recent variations of every of those packages have been laden with obfuscated scripts.”

Cybersecurity

The affected packages and their hijacked variations are listed beneath –

  • country-currency-map (2.1.8)
  • bnb-javascript-sdk-nobroadcast (2.16.16)
  • @bithighlander/bitcoin-cash-js-lib (5.2.2)
  • eslint-config-travix (6.3.1)
  • @crosswise-finance1/sdk-v2 (0.1.21)
  • @keepkey/device-protocol (7.13.3)
  • @veniceswap/uikit (0.65.34)
  • @veniceswap/eslint-config-pancake (1.6.2)
  • babel-preset-travix (1.2.1)
  • @travix/ui-themes (1.1.5)
  • @coinmasters/sorts (4.8.16)

Evaluation of those packages by the software program provide chain safety agency has revealed that they’ve been poisoned with closely obfuscated code in two completely different scripts: “bundle/scripts/launch.js” and “bundle/scripts/diagnostic-report.js.”

npm Packages Hijacked

The JavaScript code, which run instantly after the packages are put in, are designed to reap delicate information similar to API keys, entry tokens, SSH keys, and exfiltrate them to a distant server (“eoi2ectd5a5tn1h.m.pipedream[.]internet”).

Curiously, not one of the GitHub repositories related to the libraries have been modified to incorporate the identical adjustments, elevating questions as to how the risk actors behind the marketing campaign managed to push malicious code. It is at the moment not recognized what the tip objective of the marketing campaign is.

“We hypothesize the reason for the hijack to be outdated npm maintainer accounts getting compromised both through credential stuffing (which is the place risk actors retry usernames and passwords leaked in earlier breaches to compromise accounts on different web sites), or an expired area takeover,” Sharma mentioned.

Cybersecurity

“Given the concurrent timing of the assaults on a number of tasks from distinct maintainers, the primary situation (maintainer accounts takeover) seems to be extra possible versus well-orchestrated phishing assaults.”

The findings underscore the necessity for securing accounts with two-factor authentication (2FA) to stop takeover assaults. In addition they spotlight the challenges related to imposing such safety safeguards when open-source tasks attain end-of-life or are not actively maintained.

“The case highlights a urgent want for improved provide chain safety measures and larger vigilance in monitoring third-party software program registries builders,” Sharma mentioned. “Organizations should prioritize safety at each stage of the event course of to mitigate dangers related to third-party dependencies.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.

Leave a Reply