{"id":155013,"date":"2025-04-12T19:00:07","date_gmt":"2025-04-12T16:00:07","guid":{"rendered":"https:\/\/cryptodnes.bg\/en\/?p=155013"},"modified":"2025-04-12T01:49:25","modified_gmt":"2025-04-11T22:49:25","slug":"crypto-wallets-targeted-by-sophisticated-malware-campaign","status":"publish","type":"post","link":"https:\/\/cryptodnes.bg\/en\/crypto-wallets-targeted-by-sophisticated-malware-campaign\/","title":{"rendered":"Crypto Wallets Targeted by Sophisticated Malware Campaign"},"content":{"rendered":"
This wave of cyberattacks uses a deceptive software supply chain to target popular Web3 wallets, including Atomic Wallet and Exodus, exploiting vulnerabilities in the npm package manager commonly used by JavaScript and Node.js developers.<\/p>\n
The attack centers around a malicious package, pdf-to-office, which masquerades as a tool for converting PDF documents into Microsoft Office formats. However, once downloaded and executed, the package quietly inserts harmful code into the victim\u2019s system, specifically altering locally installed versions of trusted crypto wallets like Atomic Wallet and Exodus.<\/p>\n
This code then enables attackers to secretly intercept and reroute cryptocurrency transactions to wallets they control, all while the victim remains unaware.<\/p>\n