Ghost Campaign Steals Crypto via npm Packages – Veri Sızıntısı

Ghost Campaign: How 7 npm Packages Are Stealing Crypto Wallets & Credentials

Cybersecurity researchers have uncovered a new threat dubbed the 'Ghost' campaign. This operation utilizes 7 malicious npm packages to steal cryptocurrency wallets and sensitive credentials from unsuspecting developers. The full extent of the breach is still under investigation.

Ghost Campaign: How 7 npm Packages Are Stealing Crypto Wallets & Credentials

New Threat Emerges in the Cybersecurity Landscape: The Ghost Campaign

Cybersecurity researchers have identified a new malicious campaign targeting the software development ecosystem. This operation, named 'Ghost,' is being executed through widely used npm packages within the Node.js ecosystem.

How Does It Work?

Attackers have prepared a total of 7 malicious npm packages and managed to get them incorporated into developers' projects. While these packages may appear harmless at first glance, they secretly operate in the background, targeting the following sensitive information from users' computers:

  • Cryptocurrency wallet details
  • Sensitive credentials (usernames, passwords, etc.)
  • Other important data

Once this information is stolen, it can be misused by cybercriminals. It is crucial for developers to exercise extreme caution when using npm packages and to download them from trusted sources.

Has your email been leaked? Check for free — results in seconds.

Check Now →

Weekly Newsletter

Curated data breach news delivered to your inbox every week.