Article Details

Scrape Timestamp (UTC): 2025-08-18 06:41:02.150

Source: https://www.theregister.com/2025/08/18/solana_infostealer_npm_malware/

Original Article Text

Click to Toggle View

Someone's poking the bear with infostealers targeting Russian crypto developers. If you wanted to hurt Putin’s ransomware racketeers, these info-stealing npm packages are one way to do it. Researchers at software supply chain security outfit Safety think they’ve found malware that targets Russian cryptocurrency developers, and perhaps therefore Russia’s state-linked ransomware crews Safety’s head of research Paul McCarty last week revealed his discovery of npm packages that he wrote “targeted the Solana cryptocurrency ecosystem and pretend to ‘scan’ for Solana SDK components.” The threat actor uses the handle “cryptohan”, which McCarty says is familiar in the crypto community, and used by “multiple people and multiple companies.” “We suspect the use of this name is just to provide the illusion of legitimacy rather than pretending to be a specific person or personality,” he added. That veneer of credibility helps this threat actor to convince Solana devs to implement packages called “solana-pump-test” and “solana-spl-sdk” that reside on the npm Registry, a collection of open-source code favored by JavaScript devs. The packages are infostealers that search for information including possible cryptocurrency tokens, then send data to command and control servers (C2) that have IP addresses linked to the USA. Those servers expose plenty of info about compromised hosts, including password files, crypto exchange credentials, and crypto token wallet files. Some of that info seen by Safety’s researchers suggests victims of the infostealers appear to be in Russia. McCarty wonders if the combination of a US-linked C2 server and victims linked to Russia indicates these npm packages are the work of a state-sponsored actor. He offers no evidence for that theory, but the logic behind it is appealing as Kremlin-backed ransomware gangs and the affiliates who operate their wares usually demand payment in cryptocurrency – a practice many nations would like to deter if not halt outright. If anti-ransomware forces use a simple tactic like posting poisoned packages to the npm Registry to take out some players, that’s a win. It’s bad news, however, for those who use Solana as its developers intended – as the underpinning of decentralized apps and to record and enact smart contracts – or who use the SOL token for legitimate purposes. Those developers need to sanitize their software supply chains, and Safety is of course happy to help.

Daily Brief Summary

MALWARE // Infostealing Malware Targets Russian Crypto Developers via NPM Packages

Researchers at Safety identified malicious npm packages targeting Russian cryptocurrency developers, potentially linked to state-sponsored ransomware groups.

The malware, disguised as legitimate Solana SDK components, aims to steal cryptocurrency tokens and sensitive data from developers.

The threat actor, using the name "cryptohan," exploits the npm Registry to distribute infostealers under the guise of credibility.

Data extracted by the malware is sent to command and control servers with IP addresses associated with the USA.

Victims appear to be primarily located in Russia, raising suspicions of geopolitical motivations behind the attack.

The incident underscores the need for developers to secure their software supply chains against such threats.

Safety offers assistance to developers in sanitizing their software ecosystems to prevent further exploitation.