By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses
Tech News

Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses

By Viral Trending Content 5 Min Read
Share
SHARE

Apr 10, 2025Ravie LakshmananMalware / Cryptocurrency

Swapping Crypto Addresses

Threat actors are continuing to upload malicious packages to the npm registry so as to tamper with already-installed local versions of legitimate libraries and execute malicious code in what’s seen as a sneakier attempt to stage a software supply chain attack.

The newly discovered package, named pdf-to-office, masquerades as a utility for converting PDF files to Microsoft Word documents. But, in reality, it harbors features to inject malicious code into cryptocurrency wallet software associated with Atomic Wallet and Exodus.

“Effectively, a victim who tried to send crypto funds to another crypto wallet would have the intended wallet destination address swapped out for one belonging to the malicious actor,” ReversingLabs researcher Lucija Valentić said in a report shared with The Hacker News.

Cybersecurity

The npm package in question was first published on March 24, 2025, and has received three updates since then but not before the previous versions were likely removed by the authors themselves. The latest version, 1.1.2, was uploaded on April 8 and remains available for download. The package has been downloaded 334 times to date.

The disclosure comes merely weeks after the software supply chain security firm uncovered two npm packages named ethers-provider2 and ethers-providerz that were engineered to infect locally installed packages and establish a reverse shell to connect to the threat actor’s server over SSH.

What makes this approach an attractive option for threat actors is that it allows the malware to persist on developer systems even after the malicious package is removed.

An analysis of pdf-to-office has revealed that the malicious code embedded within the package checks for the presence of the “atomic/resources/app.asar” archive inside the “AppData/Local/Programs” folder to ascertain that Atomic Wallet is installed on the Windows computer, and if so, introduce the clipper functionality.

“If the archive was present, the malicious code would overwrite one of its files with a new trojanized version that had the same functionality as the legitimate file, but switched the outgoing crypto address where funds would be sent with the address of a Base64-encoded Web3 wallet belonging to the threat actor,” Valentić said.

Swapping Crypto Addresses

In a similar vein, the payload is also designed to trojanize the file “src/app/ui/index.js” associated with the Exodus wallet.

But in an interesting twist, the attacks are aimed at two specific versions each of both Atomic Wallet (2.91.5 and 2.90.6) and Exodus (25.13.3 and 25.9.2) so as to ensure that the correct JavaScript files are overwritten.

“If, by chance, the package pdf-to-office was removed from the computer, the Web3 wallets’ software would remain compromised and continue to channel crypto funds to the attackers’ wallet,” Valentić said. “The only way to completely remove the malicious trojanized files from the Web3 wallets’ software would be to remove them completely from the computer, and re-install them.”

The disclosure comes as ExtensionTotal detailed 10 malicious Visual Studio Code extensions that stealthily download a PowerShell script that disables Windows security, establishes persistence through scheduled tasks, and installs an XMRig cryptominer.

Cybersecurity

The extensions were collectively installed over a million times before they were taken down. The names of the extensions are below –

  • Prettier — Code for VSCode (by prettier)
  • Discord Rich Presence for VS Code (by Mark H)
  • Rojo — Roblox Studio Sync (by evaera)
  • Solidity Compiler (by VSCode Developer)
  • Claude AI (by Mark H)
  • Golang Compiler (by Mark H)
  • ChatGPT Agent for VSCode (by Mark H)
  • HTML Obfuscator (by Mark H)
  • Python Obfuscator for VSCode (by Mark H)
  • Rust Compiler for VSCode (by Mark H)

“The attackers created a sophisticated multi-stage attack, even installing the legitimate extensions they impersonated to avoid raising suspicion while mining cryptocurrency in the background,” ExtensionTotal said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

AirPods Max 2: Apple’s Over-Ear Redemption is Finally Here

China’s DeepSeek suffers rare outage lasting several hours

Best Fitness Tracker 2026: Fitbits, Bands & Hybrids

Your Photos Are Probably Giving Away Your Location. Here’s How to Stop That

Critical Fortinet Forticlient EMS flaw now exploited in attacks

TAGGED: cryptocurrency, Cryptomining, Cyber Security, Cybersecurity, Internet, Malware, software security, supply chain attack, Visual Studio
Share This Article
Facebook Twitter Copy Link
Previous Article Just released: our 3 top small-cap stocks to consider buying in April [PREMIUM PICKS]
Next Article AI to double data centre energy demand by 2030
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

AirPods Max 2: Apple’s Over-Ear Redemption is Finally Here
Tech News
2026 World Cup: 9 Non-USA Group Stage Matches We're Excited For
Sports
Stock Market Holiday: NSE, BSE shut tomorrow for Mahavir Jayanti; check 12 upcoming holidays
Business
TxFlow L1 mainnet launch marks a new phase for multi-application on-chain finance
Crypto
China’s DeepSeek suffers rare outage lasting several hours
Tech News
Gold and silver prices plunge: Why has safe-haven demand faded amid Iran war?
Business
Qatar and Ukraine sign defence agreement as Zelenskyy’s Gulf tour shapes new partnerships
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

AirPods Max 2: Apple’s Over-Ear Redemption is Finally Here

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
AirPods Max 2: Apple’s Over-Ear Redemption is Finally Here
March 30, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?