Malicious npm Package Targets Crypto Wallet Apps on Windows

Malicious npm Package Disguised as Popular Email Library Targets Crypto Wallets on Windows

  • A malicious npm package impersonated a popular email library to target crypto wallet apps on Windows.
  • The package, named nodejs-smtp, was downloaded 347 times since April 2025 before removal.
  • Attackers used the package to secretly inject wallet-draining code into Atomic and Exodus desktop wallets.
  • The package maintained email-sending features to appear legitimate and avoid detection.
  • The attack changed wallet transaction addresses to those controlled by the threat actor, redirecting popular cryptocurrencies.

Cybersecurity researchers have revealed that a fake npm package targeted cryptocurrency wallet applications on Windows computers earlier in 2025. The package, called nodejs-smtp, was created to imitate the legitimate nodemailer email library. This malicious package aimed to inject harmful code into the Atomic and Exodus desktop apps in order to steal funds from users.

- Advertisement -

The package was uploaded in April 2025 by a user known as “nikotimon” and was downloaded 347 times before its removal. According to researchers at Socket, the package imported using Electron, which is used to build desktop apps, to access and edit the internal files of affected wallet applications. The goal was to secretly replace certain parts of these apps with a hidden payload under the threat actor’s control.

Socket researcher Kirill Boychenko explained that the package would overwrite the recipient cryptocurrency address with hard-coded addresses controlled by the attacker. This allowed the Malware to intercept and reroute transactions involving Bitcoin (BTC), Ethereum (ETH), Tether (USDT and TRX USDT), XRP, and Solana (SOL). As Boychenko stated, “On import, the package uses Electron tooling to unpack Atomic Wallet’s app.asar, replace a vendor bundle with a malicious payload, repackage the application, and remove traces by deleting its working directory.”

Despite its malicious intent, nodejs-smtp performed as a regular email mailer, matching the interface of nodemailer. This allowed it to function in application tests, further reducing suspicion from developers. The strategy of disguising harmful functions within seemingly normal tools is known as a software supply chain attack.

This incident follows a similar attack involving an npm package called “pdf-to-office,” which also targeted these wallets by altering app files to add transaction-stealing functions. These campaigns highlight the risk of importing new packages in development environments, as attackers may use them to quietly change how desktop applications work.

- Advertisement -

Researchers warn that these kinds of attacks could persist and pose threats to both individuals and companies using desktop crypto wallets.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Unstable Ground: Looming U.S. Crypto Rules May Lack Legal Backing

SEC Chairman Paul Atkins is pushing for crypto rules but warns they need a...

Apple Stock Forms Technical Buy Point, Nears Breakout

Apple stock (AAPL) is forming a technical buy point and nearing a breakout, with...

LSEG to launch Digital Securities Sandbox for tokenization

London Stock Exchange Group (LSEG) plans to launch a Digital Securities Sandbox (DSD) this...

Tesla China Sales Slide in Jan., Exports Jump 71%

Tesla's retail sales in China plunged to 18,485 vehicles in January, their lowest monthly...

Standard Chartered Sees Bitcoin Drop to $50K Before Rise

Standard Chartered forecasts Bitcoin will fall to $50,000 and Ethereum to $1,400 before eventually...

Must Read

Top 8 Best Anonymous Web Hosting Companies That Accept Crypto

Nowadays, there is plenty of information about people online, and malicious people use them to carry out inappropriate activities. If you want to keep...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!