Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Cybercriminals are targeting Ethereum developers with fake Hardhat npm packages
Global Security

Cybercriminals are targeting Ethereum developers with fake Hardhat npm packages

AdminBy AdminJanuary 6, 2025No Comments3 Mins Read
Ethereum Devs
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 6, 2025Ravi LakshmananBlockchain / Malware

Ethereum developers

Cybersecurity researchers discovered several malicious packages in the npm registry that were found to mimic the Hardhat Nomic Foundation tool in order to steal sensitive data from developer systems.

“By exploiting trust in open source plugins, attackers infiltrated these platforms via malicious npm packages, stealing important data such as private keys, mnemonics, and configuration details,” Socket Research Group said in the analysis.

today is an Ethereum software development environment that contains various components for editing, compiling, debugging, and deploying smart contracts and decentralized applications (dApps).

Cyber ​​security

The list of detected fake packages is as follows –

  • nomic society
  • @nomisfoundation/hardconfigure
  • installed package publish
  • @nomisfoundation/hard-config
  • @monicfoundation/hardhat-config
  • @nomicsfoundation/sdk-test
  • @nomicsfoundation/hardware-config
  • @nomicsfoundation/web3-sdk
  • @nomicsfoundation/sdk-test1
  • @nomicfoundations/hardhat-config
  • crypto-nodes-validator
  • solana-validator
  • validator nodes
  • hardhat-deploy-others
  • hardhat-gas-optimizer
  • integrity-comments-extractors

From these packages, @nomicsfoundation/sdk-test attracted 1092 downloads. It was published over a year ago, in October 2023. Once installed, they are designed to collect mnemonic phrases and private keys from the Hardhat environment, after which they end up on a server controlled by the attacker.

“The attack starts when compromised packages are installed. These packages exploit the Hardhat runtime, using functions such as hreInit() and hreConfig() to collect sensitive details such as private keys, mnemonics, and configuration files,” the company said.

“Harvested data is transmitted to attacker-controlled endpoints using hard-coded Ethereum keys and addresses for optimized hijacking.”

The disclosure comes days after the discovery of another malicious npm package called ethereumvulncontracthandler which masquerades as a library for detecting vulnerabilities in Ethereum smart contracts, but instead contains functionality to remove the Quasar RAT malware.

There have also been malicious npm packages in recent months is observed using Ethereum smart contracts to distribute Command and Control (C2) server addresses, co-opting infected machines into the MisakaNetwork botnet, which runs on the blockchain. The campaign was traced to a Russian-speaking threat actor named “_lain”.

“The threat actor points to the inherent complexity of the npm ecosystem, where packages often rely on numerous dependencies, creating a complex nesting box structure,” – Socket said.

Cyber ​​security

“This chain of dependencies makes comprehensive security checks difficult and opens up opportunities for attackers to inject malicious code. _lain admits to exploiting this complexity and sprawl of dependencies in npm ecosystems, knowing that it is impractical for developers to scrutinize every package and dependency.”

That’s not all. A set of fake libraries in the npm, PyPI, and RubyGems ecosystems have been discovered that use out-of-band application security testing (OAST) tools such as oastify.com and oast.fun to transmit sensitive data to attacker-controlled servers.

The package names are as follows –

  • adobe-dcapi-web (npm), which avoids the threat to Windows, Linux, and macOS endpoints located in Russia and provides the ability to collect system information
  • monoliht (PyPI), which collects system metadata
  • chauuuyhhn, nosvemosssadfsd, holaaaaaafasdf (RubyGems), which contain embedded scripts designed to forward sensitive information via DNS queries to the oastify.com endpoint

Kirill Boychenko, Socket researcher said. “Originally designed to detect vulnerabilities in web applications, OAST techniques are increasingly being used to steal data, establish command-and-control (C2) channels, and perform multi-stage attacks.”

To reduce the supply chain risks associated with such packages, software developers are encouraged to validate packages, use care when entering package names, and check the source code before installation.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.