Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packag

The cryptocurrency and blockchain development ecosystem is facing an unprecedented surge in sophisticated malware campaigns targeting the open source supply chain.Over the past year, threat actors have significantly escalated their attacks against Web3 developers by publishing malicious packages to trusted registries including npm and PyPI, exploiting the implicit trust developers place in these repositories.These campaigns represent a calculated shift toward financially motivated attacks that leverage the unique vulnerabilities present in blockchain development environments.The attack landscape has become increasingly concentrated, with approximately 75% of malicious blockchain-related packages hosted on npm, 20% on PyPI, and the remainder distributed across registries such as RubyGems and Go Modules.While Ethereum and Solana continue to be the primary targets, recent campaigns have expanded to include TRON and TON platforms, indicating growing threat actor interest in a wider range of wallet formats and alternative layer-1 blockchain ecosystems.Socket.dev analysts [identified](https://socket.dev/blog/2025-blockchain-and-cryptocurrency-threat-report?utm_medium=feed) four recurring threat classes that dominate the current landscape: credential stealers, crypto drainers, cryptojackers, and clipboard hijackers.These malicious packages exploit the unique attack surface created by blockchain developers’ reliance on open source dependencies, combined with CI/CD pipelines that often lack strict dependency validation or isolation.The threat actors leverage package lifecycle hooks such as postinstall in npm and setup.py in PyPI to trigger malicious behavior immediately upon installation, even when packages are never imported or actively used.The financial impact of these attacks has been severe, with threat actors successfully extracting millions in cryptocurrency from compromised development environments.The [malware](https://cybersecuritynews.com/chatgpt-powered-malware-analysis/) campaigns demonstrate sophisticated understanding of Web3 development workflows, targeting specific wallet paths, browser extensions, and development tools commonly used by blockchain developers.**Advanced Credential Theft Mechanisms**—————————————-The most sophisticated aspect of these supply chain attacks lies in their credential extraction capabilities, which have evolved far beyond simple file system scraping. ![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaSnN0oHsyvhcCgOi1gw1RiKGjNeAOmypPOd_DpgH9gdf-m58XPcDU1F0ABQeklodzUX8pJfMafie5LigFw4B8eGGnh9P4NKFj8wN9fpHFyJfSt7T3wZIZeLTXnnT1elqv33BkqRX-91Lh6YxgZri5_CEmuDh3eJ-ag7jj3pqRZzR4IabYICdw6wI2oEU/s16000/Contagious%20Interview%20attack%20chain%20for%20infiltrating%20Web3%20development%20environments%20(Source%20-%20Socket.dev).webp) Contagious Interview attack chain for infiltrating Web3 development environments (Source — Socket.dev)Modern credential stealers employ multi-layered approaches that combine direct file system access with runtime manipulation to capture sensitive cryptographic material from developer environments.Advanced stealers implement monkey-patching techniques that intercept keypair generation at the library level without modifying source files.In documented PyPI campaigns, malware intercepted Solana keypair creation by modifying library methods at runtime, capturing private keys during generation, encrypting them with hardcoded RSA-2048 public keys, and embedding the encrypted data in [blockchain](https://cybersecuritynews.com/blockchain-security-2/) memo transactions sent to Solana Devnet. ![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4_y1kjzrK3cQ_LhXsi4FP3Jej4qFjNqgfmZte387n1H_Nfni_XznA0Djz4RX26t4aEQiaeFVYp1UdmQ5L7cfIjBf5U02cGQnMqI3AEk_yl-rr9Ee3qgTiIW0csPyg09QssmlxXp6n1TP83hTmBqd1iXZfpaZEnRKgJ1kEWsmnmTMR17cfiqSlbBCvMC8/s16000/Execution%20flow%20of%20cryptojacking%20malware%20(Source%20-%20Socket.dev).webp) Execution flow of cryptojacking malware (Source — Socket.dev)This technique allows threat actors to retrieve and decrypt stolen credentials remotely while maintaining stealth. // Example of typical credential stealer targeting common wallet paths const fs = require(‘fs’); const path = require(‘path’); const walletPaths = [ ‘~/.config/solana/id.json’, ‘~/.ledger-live’, ‘~/Library/Application Support/Exodus/exodus. Wallet’ ]; walletPaths.forEach(walletPath => { if (fs.existsSync(path.expanduser(walletPath))) { // Exfiltrate wallet data via encrypted channels } });Nation-state actors, particularly those linked to North Korea’s Contagious Interview [campaign](https://cybersecuritynews.com/new-phishing-campaign-attacking-investors/), have weaponized trusted developer tools including linters, validators, and post-processing libraries to deliver credential stealers and backdoors.These attacks bypass traditional [security measures](https://cybersecuritynews.com/security-measures-that-help-protect-your-crypto/) including multi-factor authentication and hardware wallets by compromising the development environment itself, establishing persistence through scheduled tasks and startup entries to ensure recurring access to victim systems.****Automate threat response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs across all endpoints** –> [**Request full access**](https://intelligence.any.run/plans?utm_source=csn_jun&utm_medium=article&utm_campaign=free-vs-paid-ti-feeds&utm_content=plans&utm_term=100625)**The post [Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages](https://cybersecuritynews.com/threat-actors-attacking-cryptocurrency-and-blockchain-developers/) appeared first on [Cyber Security News](https://cybersecuritynews.com).

Related Tags:
NAICS: 52 – Finance And Insurance

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 33 – Manufacturing – Metal

Electronics And Other

NAICS: 523 – Securities

Commodity Contracts

Other Financial Investments And Related Activities

NAICS: 51 – Information

Financial Theft

Blog: Cybersecurity News

Impair Defenses: Disable or Modify Tools

Impair Defenses

Associated Indicators: