Ghost Campaign Uses 7 Npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 Npm Packages to Steal Crypto Wallets and Credentials

The Hacker News
The Hacker NewsMar 24, 2026

Why It Matters

The campaign exploits trusted development ecosystems to steal high‑value crypto assets and credentials, posing a direct financial threat to developers and enterprises. Its use of Telegram and Binance Smart Chain for monetization demonstrates a sophisticated, multi‑layered revenue model.

Key Takeaways

  • Seven npm packages masquerade as developer tools
  • Packages phish sudo passwords during fake install
  • Malware contacts Telegram for payload URL and decryption key
  • Final stage deploys RAT stealing wallets, credentials
  • Campaign uses GitHub, AI workflows to broaden reach

Pulse Analysis

The Ghost campaign illustrates how attackers are moving beyond traditional malware distribution channels, targeting the very tools developers rely on daily. By publishing seemingly innocuous npm packages and GitHub repositories, the threat actors embed credential‑stealing logic that activates only after a user unwittingly grants elevated privileges. This approach leverages the trust developers place in open‑source ecosystems, turning routine package installations into a covert infection vector that can compromise development pipelines and production environments alike.

A notable aspect of the operation is its multi‑stage architecture. Initial packages request sudo access under the guise of system optimization, then silently retrieve a downloader from a Telegram channel. The downloader decrypts a payload hosted via a Binance Smart Chain smart contract, enabling rapid updates without altering the core malware. This modular design not only streamlines the attackers’ ability to pivot tactics but also complicates detection, as each stage appears benign until the final remote‑access trojan is executed.

For organizations, the implications are clear: supply‑chain security must extend to every dependency, including seemingly low‑risk utilities. Implementing strict permission controls, monitoring for anomalous npm install logs, and employing runtime security tools can mitigate the risk of credential exfiltration. As AI‑assisted development workflows gain traction, security teams should also scrutinize automated code generation pipelines for hidden malicious scripts, ensuring that the convenience of modern tooling does not become an attack surface.

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Comments

Want to join the conversation?

Loading comments...