Close Menu
  • Home
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • NFT
  • DeFi
  • Blockchain
  • Technology
  • Cryptocurrency
  • All Posts

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Yemenis Embrace DeFi as Sanctions Disrupt Traditional Banking: Report

Apr. 18, 2025

Non-KYC Exchange eXch to Shut Down Following Investigation into Alleged Connections with Lazarus Group

Apr. 18, 2025

Ethereum Transaction Fees Plummet to a 5-Year Low of Just $0.17 Per Transfer: Is Widespread Adoption on the Horizon?

Apr. 17, 2025
Facebook X (Twitter) Instagram
CeDiFi LoopCeDiFi Loop
  • Home
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • NFT
  • DeFi
  • Blockchain
  • Technology
  • Cryptocurrency
  • All Posts
Facebook X (Twitter) Instagram Pinterest Vimeo
Subscribe
CeDiFi LoopCeDiFi Loop
Home » New Malicious Campaign Aims at Atomic and Exodus Wallets
Blockchain

New Malicious Campaign Aims at Atomic and Exodus Wallets

By adminApr. 11, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
New Malicious Campaign Aims at Atomic and Exodus Wallets
New Malicious Campaign Aims at Atomic and Exodus Wallets
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

New Malicious Campaign Targets Atomic and Exodus Wallets

The security firm ReversingLabs’ research team has discovered yet another campaign targeting specific versions of the popular crypto wallets Exodus and Atomic. According to the report, threat actors “have been targeting the cryptocurrency community hard lately.” They’re using various methods to hijack popular and legitimate crypto packages to loot people’s wallets.

However, the researchers highlight that hijacking open-source packages is difficult due to the size of the open-source software (OSS) developer community. The tampered-with OSS packages will be detected.

Therefore, threat actors are working hard to make their methods more obscure. A new technique that ReversingLabs discovered is uploading packages to OSS repositories and having them apply malicious ‘patches’ to local versions of legitimate libraries. The goal is the same: install an unnoticeable malicious code in a popular, trusted local library.

The researchers found “a number of campaigns” in recent weeks attempting this strategy. Notably, on 1 April, a malicious entity published a package, pdf-to-office, to the npm package manager. This package posed as a library for converting PDF to Microsoft Office documents. Once executed, it would inject malicious code into locally installed Atomic Wallet and Exodus. It would overwrite existing files. “Effectively, a victim who tried to send crypto funds to another wallet would have the intended destination address swapped out for one belonging to the malicious actor,” the report states.

Additionally, this campaign is quite similar to the one the researchers discussed in a research post in March. In both of these cases, the malicious campaign had no effect on the official Atomic Wallet and Exodus Wallet installers available on the websites.

Aiming for Specific Wallet Versions

ReversingLabs first detected the pdf-to-office package after its update to npm on 1 April. It was removed soon after detection. But a couple of days later, the threat actor published a new version that looked like the first one. They released three versions of the package over a few weeks in March and April with the same functionality.

The malicious payload worked to detect the presence of the atomic/resources/app.asar archive inside AppData/Local/Programs directory. Finding it would mean that the unsuspecting user installed Atomic Wallet on their now-infected computer. Then, the malicious code searched for the archive to overwrite one of its files with a trojanized version that changes the outgoing crypto address. Now, the funds would go straight to the threat actor’s wallet. “That was the only difference between the legitimate and trojanized file, except that the malicious version of the file was not minified,” the report notes.

Additionally, the threat actors focused on specific versions of Atomic. The attack code would adjust which files were overwritten based on the wallet version it found. Moreover, there was a malicious payload that attempted to inject a trojanized file inside a legitimate, locally-installed Exodus wallet. It targeted the two latest versions of Exodus.

Also, if the victim removed the package pdf-to-office from the computer, the Web3 wallets’ software would still remain compromised. This means it would continue directing crypto to the attackers’ wallet. “The only way to completely remove the malicious trojanized files from the Web3 wallets’ software would be to remove them completely from the computer and re-install them,” ReversingLabs concludes.

Meanwhile, North Korea’s Lazarus group has been targeting crypto developers via npm supply chain attacks for months in a highly sophisticated global campaign to steal funds and data.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Non-KYC Exchange eXch to Shut Down Following Investigation into Alleged Connections with Lazarus Group

Apr. 18, 2025

Ethereum Transaction Fees Plummet to a 5-Year Low of Just $0.17 Per Transfer: Is Widespread Adoption on the Horizon?

Apr. 17, 2025

$FARTCOIN Set for Significant Breakout as Social Volume Increases by 450% at Critical Support Level

Apr. 17, 2025
Leave A Reply Cancel Reply

Top Posts

Consensys Seeks Extension for IRS Crypto Reporting Regulations

Jan. 1, 2023

Elon Musk’s OpenAI Troll Ignites Enthusiasm and Speculation within Crypto Community

Mar. 7, 2024

Restoration of Old Devices in Emerging Markets through Aphone, a Virtual Smartphone App on Solana

Mar. 8, 2024

Elon Musk to Make AI Chatbot Grok Open-Source Amid Ongoing OpenAI Lawsuit

Mar. 11, 2024
Don't Miss
DeFi

Yemenis Embrace DeFi as Sanctions Disrupt Traditional Banking: Report

Apr. 18, 2025

Yemenis Turn to DeFi as Sanctions Cut Off Traditional Banking: Report As financial sanctions and…

Non-KYC Exchange eXch to Shut Down Following Investigation into Alleged Connections with Lazarus Group

Apr. 18, 2025

Ethereum Transaction Fees Plummet to a 5-Year Low of Just $0.17 Per Transfer: Is Widespread Adoption on the Horizon?

Apr. 17, 2025

Over $120 Million Transferred to Solana in 30 Days, with $41.5 Million from Ethereum Leading the Contribution

Apr. 17, 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Website Introduction
Website Introduction

CeDiFi Loop is your gateway to the world of blockchain and Web3. We provide authoritative, in-depth coverage of cryptocurrency news and analysis, helping you understand the transformation and development of the digital asset world.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Yemenis Embrace DeFi as Sanctions Disrupt Traditional Banking: Report

Apr. 18, 2025

Non-KYC Exchange eXch to Shut Down Following Investigation into Alleged Connections with Lazarus Group

Apr. 18, 2025

Ethereum Transaction Fees Plummet to a 5-Year Low of Just $0.17 Per Transfer: Is Widespread Adoption on the Horizon?

Apr. 17, 2025
Most Popular

Consensys Seeks Extension for IRS Crypto Reporting Regulations

Jan. 1, 2023

Elon Musk’s OpenAI Troll Ignites Enthusiasm and Speculation within Crypto Community

Mar. 7, 2024

Restoration of Old Devices in Emerging Markets through Aphone, a Virtual Smartphone App on Solana

Mar. 8, 2024
  • Home
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • NFT
  • DeFi
  • Blockchain
  • Technology
  • Cryptocurrency
  • All Posts
© 2025 CeDiFi Loop All rights reserved.

Type above and press Enter to search. Press Esc to cancel.