22.7 C
New York
Saturday, September 6, 2025

Malicious npm Bundle nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets


Sep 02, 2025Ravie LakshmananCryptocurrency / Malware

Malicious npm Bundle nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets

Cybersecurity researchers have found a malicious npm bundle that comes with stealthy options to inject malicious code into desktop apps for cryptocurrency wallets like Atomic and Exodus on Home windows techniques.

The bundle, named nodejs-smtp, impersonates the official e-mail library nodemailer with an equivalent tagline, web page styling, and README descriptions, attracting a complete of 347 downloads because it was uploaded to the npm registry in April 2025 by a person named “nikotimon.” It is at present now not out there.

“On import, the bundle makes use of Electron tooling to unpack Atomic Pockets’s app.asar, substitute a vendor bundle with a malicious payload, repackage the appliance, and take away traces by deleting its working listing,” Socket researcher Kirill Boychenko stated.

CIS Build Kits

The principle goal is to overwrite the recipient handle with hard-coded wallets managed by the risk actor, redirecting Bitcoin (BTC), Ethereum (ETH), Tether (USDT and TRX USDT), XRP (XRP), and Solana (SOL) transactions, successfully appearing as a cryptocurrency clipper.

That having stated, the bundle delivers on its said performance by appearing as an SMTP-based mailer in an try and keep away from elevating builders’ suspicion.

The bundle nonetheless works as a mailer and exposes a drop-in interface suitable with nodemailer. That purposeful cowl lowers suspicion, permits software assessments to move, and offers builders little purpose to query the dependency.

The event comes months after ReversingLabs found an npm bundle named “pdf-to-office” that achieved the identical objectives by unpacking the “app.asar” archives related to Atomic and Exodus wallets and modifying inside them a JavaScript file to introduce the clipper operate.

“This marketing campaign exhibits how a routine import on a developer workstation can quietly modify a separate desktop software and persist throughout reboots,” Boychenko stated. “By abusing import time execution and Electron packaging, a lookalike mailer turns into a pockets drainer that alters Atomic and Exodus on compromised Home windows techniques.”

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles