Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Malicious Npm Package Mimics Nodemailer

September 4, 2025
Reading Time: 3 mins read
in Alerts
WhatsApp Scam Lets Hackers Hijack Chats

Cybersecurity researchers recently unearthed a deceptive npm package, nodejs-smtp, that poses as the well-known email library nodemailer. The malicious package, uploaded by a user named “nikotimon,” was designed with an identical tagline, page styling, and README descriptions to attract unsuspecting developers. With 347 downloads before it was removed from the npm registry, its main purpose was to act as a cryptocurrency clipper by targeting popular desktop wallets such as Atomic and Exodus on Windows systems. The deceptive package even maintained its stated SMTP-based mailer functionality, which helped it avoid suspicion and ensured that developers’ application tests would still pass.

The primary mechanism of the malicious package involves abusing Electron tooling, a framework used to build desktop applications with web technologies. When imported, the package automatically unpacks the targeted application’s app.asar archive, which is essentially the application’s core code and assets. It then replaces a specific vendor bundle with its own malicious payload. After the code injection is complete, the package repacks the application and deletes its temporary working directories to remove any traces of the compromise. This sophisticated process allows the malicious code to be injected discreetly and persist across system reboots, making it a persistent threat to the affected applications.

The core objective of the injected malicious code is to intercept and redirect cryptocurrency transactions. By acting as a clipper, the payload is designed to overwrite the legitimate recipient’s address with a hard-coded wallet address controlled by the threat actor. This functionality allows the attacker to hijack various cryptocurrency transactions, including Bitcoin (BTC), Ethereum (ETH), Tether (USDT and TRX USDT), XRP (XRP), and Solana (SOL). Instead of the funds going to the intended recipient, they are rerouted to the attacker’s wallet, effectively draining the user’s funds without them realizing the compromise until it is too late.

This discovery is not an isolated incident. Months before this campaign, another malicious npm package, pdf-to-office, was found to employ a similar strategy. That package also unpacked the app.asar archives of Atomic and Exodus wallets and modified a JavaScript file within them to introduce a clipper function. This pattern suggests a recurring and evolving threat where attackers are exploiting developer workflows and the trust in package repositories like npm to distribute malware. These campaigns highlight the need for developers to exercise caution and thoroughly vet any third-party dependencies they integrate into their projects.

The incident serves as a significant warning about the risks associated with supply chain attacks in the software development ecosystem. As noted by Socket researcher Kirill Boychenko, the campaign demonstrates how a routine import can quietly and permanently modify a separate desktop application, turning a seemingly innocuous mailer library into a wallet drainer. This type of attack underscores the importance of robust security practices, including using tools that can analyze dependencies for malicious behavior and maintaining strict control over what code is allowed to execute during the build and import process.

Reference:

  • Malicious Npm Package Nodejs Smtp Mimics Nodemailer And Targets Crypto Wallets
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Experian Fined For Data Collection

TikTok Videos Driving Infostealer Attacks

October 20, 2025
Experian Fined For Data Collection

Chrome Extensions Hijack WhatsApp Web

October 20, 2025
Experian Fined For Data Collection

Google Ads Used To Push Fake Software

October 20, 2025
Sothebys Data Breach Exposes Customers

Microsoft Pulls 200 Suspicious Certificates

October 17, 2025
Sothebys Data Breach Exposes Customers

NK Hackers Hide Malware In Blockchain

October 17, 2025
Sothebys Data Breach Exposes Customers

Hackers Spread Malware With Blockchain

October 17, 2025

Latest Alerts

TikTok Videos Driving Infostealer Attacks

Chrome Extensions Hijack WhatsApp Web

Google Ads Used To Push Fake Software

Microsoft Pulls 200 Suspicious Certificates

NK Hackers Hide Malware In Blockchain

Hackers Spread Malware With Blockchain

Subscribe to our newsletter

    Latest Incidents

    AWS Outage Disrupts Major Services

    Envoy Air Hit By Oracle System Hack

    F5 Breach Hits 262000 BIGIP Systems

    Pro Hamas Hackers Target Airport Speakers

    Prosper Breach Hits 17 Million Accounts

    Sothebys Data Breach Exposes Customers

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial