Malicious npm Packages Steal Ethereum Wallets by Impersonating Flashbots

Malicious npm Packages Disguised as Flashbots Tools Target Ethereum Wallets and Developers

  • Researchers have found four harmful npm packages targeting Ethereum wallet credentials.
  • The packages pretend to be official Flashbots tools but steal private keys and mnemonic phrases.
  • The attackers use Telegram bots and Mailtrap for sending stolen data.
  • Some of the packages redirect transactions to attacker-controlled wallets.
  • Vietnamese language comments suggest a Vietnamese-speaking attacker.

Security researchers discovered four malicious software packages on the npm registry that target cryptocurrency developers by stealing sensitive wallet information. The packages, uploaded by a user called flashbotts, were posted between September 2023 and August 19, 2025, and are still available for download.

- Advertisement -

According to Socket researcher Kush Pandya, the harmful packages pretend to be legitimate cryptographic utilities and claim to offer compatibility with Flashbots MEV infrastructure. In reality, these packages extract private keys and mnemonic seed phrases—critical information for accessing cryptocurrency wallets—and send them to an attacker-controlled Telegram bot. One of the packages, @flashbotts/ethers-provider-bundle, also transmits environment variables over SMTP using Mailtrap, which allows communication with external email services.

The most dangerous package, @flashbotts/ethers-provider-bundle, hides its harmful actions under the appearance of offering full API support for Flashbots. It includes a function that forwards all unsigned Ethereum transactions to the attacker’s address and logs information from already signed transactions. Another package, sdk-ethers, can send wallet seed phrases to the Telegram bot, though these functions only activate when called by developers in their code. The package flashbot-sdk-eth also tries to steal private keys, and gram-utilz provides a way to send any data to the attacker’s Telegram chat.

Mnemonic phrases serve as the master password to restore and access cryptocurrency wallets. If attackers steal these phrases, they can take full control of victims’ funds. Socket’s analysis found comments in Vietnamese throughout the code, suggesting the attacker may be Vietnamese-speaking.

Socket stated, “Because Flashbots is widely trusted by validators, searchers, and DeFi developers, any package that appears to be an official SDK has a high chance of being adopted by operators running trading bots or managing hot wallets. A compromised private key in this environment can lead to immediate, irreversible theft of funds.”

- Advertisement -

Researchers say these attacks take advantage of trust in familiar package names and legitimate-looking utilities to slip harmful code past users. The findings highlight a growing threat of software supply chain attacks that exploit trust within the cryptocurrency development community.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Vercel Users Quit After CEO Poses With Netanyahu at AI Meeting

Vercel is losing users after its CEO, Guillermo Rauch, posted a selfie with Israeli...

Turkey Plans Law Letting Watchdog Freeze Crypto, Bank Accounts

Turkey is proposing a law to give its financial intelligence unit expanded powers to...

Microsoft Expands Sentinel SIEM with Data Lake and AI Agent Tools

Microsoft has made its Sentinel Security Incidents and Event Management (SIEM) solution a unified...

SWIFT Teams With 30+ Banks for Blockchain-Based Ledger Payments

SWIFT has joined with over 30 major banks to offer blockchain-based payments. The initiative was...

Trump to Announce Pfizer Deal for Cheaper Medicaid Drug Prices

Pfizer is expected to announce a deal to lower its drug prices for Medicaid. The...
- Advertisement -

Must Read

How To Buy a Handshake Domain: A Step-by-Step Guide

Handshake Domains | Benefits | Drawbacks | How To Buy | Supported BrowsersIn this step-by-step guide, I am going to show you how to...