Thursday, April 24, 2025
HomecryptocurrencyThreat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Published on

SIEM as a Service

Follow Us on Google News

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications, particularly targeting cryptocurrency software.

The ReversingLabs (RL) research team has identified a pattern where attackers upload seemingly legitimate packages to repositories like npm, which then inject malicious “patches” into users’ local installations of crypto wallet software.

Hijacking Open Source Packages

The latest scheme involved a package named “pdf-to-office,” promoted as a utility for converting PDF files to Microsoft Office formats.

- Advertisement - Google News

This package, however, was a trojan horse, with its primary function being to modify legitimate software.

Crypto Packages
The difference between a legitimate and trojanized file

Upon execution, it specifically targeted Atomic Wallet and Exodus Wallet, overwriting key files with trojanized versions to redirect cryptocurrency transactions to attackers’ wallets.

The attackers have adapted their strategies to evade detection. Following RL’s report on a similar campaign in December involving the Python AI library Ultralytics, which was quickly noticed and mitigated, the threat actors developed subtler approaches.

The compromised packages now attempt to blend in with regular updates, making detection and response more challenging.

Specific Targets and Techniques

The malicious code in “pdf-to-office” was tailored to interact with particular versions of the Atomic Wallet, demonstrating a nuanced understanding of the software’s architecture.

Crypto Packages
Malicious payload from pdf-to-office@1.0.2

The attackers modified the attack strategy for different versions, ensuring the code could adapt to changes in file structure between Atomic Wallet versions 2.90.6 and 2.91.5.

This meticulous targeting indicates a significant level of reconnaissance and preparation by the threat actors.

Additionally, the campaign not only aimed to steal funds but also engaged in covering tracks.

The attackers collected logs from AnyDesk, a remote access tool, suggesting efforts to either gather more information or eliminate evidence of their intrusion.

The persistence of these attacks even after removal of the malicious package poses a severe security risk.

Unless the compromised wallet applications are completely uninstalled and reinstalled, the malicious code remains active, continuously siphoning funds to the attackers’ wallets.

This trend of attacking software supply chains, particularly in the cryptocurrency sector, underscores a growing threat landscape.

RL’s 2025 Software Supply Chain Security Report highlights the expanding scope of these risks, emphasizing the need for enhanced monitoring of software updates and local deployments.

Organizations must now remain vigilant not only for external threats but also for subtle modifications in software they already trust.

The Indicators of Compromise (IOCs) provided by RL, including SHA1 hashes and IP addresses linked to the campaign, are crucial for cybersecurity teams to detect and mitigate these advanced persistent threats.

This incident serves as a stark reminder of the evolving strategies in cybercrime, calling for immediate attention to security practices within the cryptocurrency community and beyond.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...