Categories: Cyber Security News

Malicious npm and PyPI Packages Disguised as Dev Tools to Steal Credentials

The Socket Threat Research Team has identified a new supply chain threat targeting developers in the crypto space: three malicious packages one on npm and two on PyPI masquerading as legitimate developer utilities while covertly exfiltrating sensitive wallet credentials.

These packages, “react-native-scrollpageviewtest” (npm), “web3x” (PyPI), and “herewalletbot” (PyPI), have collectively amassed nearly 8,000 downloads, exposing unsuspecting developers to significant asset loss by harvesting mnemonic seed phrases and private keys.

Open Source Registries Targeted by Credential-Harvesting Malware

The npm package “react-native-scrollpageviewtest,” first released in 2021, camouflages itself as a benign page-scrolling tool for React Native.

Instead, it employs advanced obfuscation by dynamically constructing sensitive API names in memory, splitting relevant strings to evade static detection, and encoding key controller references in Base64.

Once loaded, the package extracts mnemonic seed phrases and private keys from local wallet storage, prepends each exfiltrated secret with randomized data, and stealthily transmits them to a Google Analytics endpoint using standard event telemetry formats.

This abuse of Google Analytics (Tracking ID UA-215070146-1) leverages the routine whitelisting of analytics domains in enterprise environments, ensuring that the attacker’s exfiltration attempts blend in with normal network traffic and evade conventional perimeter defenses.

In parallel, two PyPI packages “web3x” and “herewalletbot” exploit the trust of Python developers with similar credential-stealing techniques.

“web3x” presents as an Ethereum wallet balance checker but, upon execution, immediately prompts the user for a mnemonic seed phrase and relays it, along with wallet balances, to an attacker-controlled Telegram bot via the Telegram Bot API.

The exfiltration is near-instantaneous and silent, enabling rapid wallet compromise.

Threat Actors Use Google Analytics and Telegram Bots for Exfiltration

The “herewalletbot” package, meanwhile, impersonates an automation tool for Telegram-based crypto rewards.

It scripts a headless browser session, guiding unsuspecting users through the Telegram login process and directly soliciting their mnemonic seed phrase under the guise of a rewards claim.

This seed phrase is then exfiltrated into the chat window of a Telegram bot (@herewalletbot), giving the attacker full control over the victim’s crypto assets.

Despite apparent attempts by its author to conceal this functionality, including amending public documentation while retaining the malicious logic, the package continued to compromise credentials until publicly flagged.

Sponsored

The threat actors behind these campaigns demonstrate operational sophistication: leveraging social engineering, string obfuscation, staged payload exfiltration, and nuanced detection evasion.

Their techniques such as Base64-encrypted API references, randomized exfiltration payloads, hardcoded bot tokens, and conditional execution to avoid developer or test environments underscore a sharp focus on persistence and stealth.

The persistence of these packages on public registries underscores a critical risk: open-source ecosystems remain a high-value vector for supply chain compromise.

Developers who inadvertently install such modules risk catastrophic loss, particularly in the context of cryptocurrency, where stolen mnemonics and private keys enable irreversible asset transfers.

Security experts urge developers to remain vigilant: never enter or transmit seed phrases or private keys to any utility, script, or package.

Tools that request such credentials especially within automation, wallet management, or browser integration contexts should be treated with extreme suspicion.

Organizations should adopt proactive measures, including automated dependency scanning, runtime monitoring, and strict code review, especially for packages related to Web3, authentication, or browser automation.

According to the Report, Socket and similar platforms provide essential tooling to proactively analyze dependencies and block threats before code reaches production.

Developers are advised to utilize these resources and consistently apply the security principle of explicit trust, particularly when handling high-value credentials within open-source pipelines.

Indicators of Compromise (IOC)

Type Indicator / Value Description
Package react-native-scrollpageviewtest Malicious npm package
Package web3x Malicious PyPI package
Package herewalletbot Malicious PyPI package
Endpoint @herewalletbot Telegram bot for exfiltration
Endpoint hxxps://web[.]telegram[.]org/k/#@herewalletbot Telegram bot phishing URL
Token 5847347125:AAG-WskaS485OUlGLfa5AKEMW1aKYymplPQ Telegram bot token (web3x)
Email twoplusten@163[.]com npm threat actor email (twoplus)
Email xeallmail@mitico[.]org PyPI threat actor email (tonymevbots)
Email bevansatria@gmail[.]com PyPI threat actor email (vannszs)
Alias twoplus npm threat actor alias
Alias tonymevbots PyPI threat actor alias
Alias vannszs PyPI/GitHub threat actor alias
GitHub https://github.com/vannszs/HotWalletBot/ Related malicious repo (defunct)
Google Analytics UA-215070146-1 Used for exfiltration by npm package

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post Malicious npm and PyPI Packages Disguised as Dev Tools to Steal Credentials appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

US, Israel strike Iran; Democrats call for immediate vote on Trump war powers

President Donald Trump in a video posted by the White House on social media announces…

22 minutes ago

Everything Coming to Disney+ in March 2026

We’ve somehow already made our way to March, which hopefully brings some spring weather, but…

1 hour ago

Pokémon TCG: Where to Buy Everything From Mega Evolution’s Upcoming Perfect Order Expansion

The pulse of Lumiose City is racing, and for good reason! Pre-orders for the Pokémon…

1 hour ago

The Rubin Observatory’s alert system sent 800,000 pings on its first night

That’s coming on a little strong, maybe. | Image: Vera C. Rubin Observatory The Vera…

2 hours ago

Phishing Attacks Impersonate Zoom and Google Meet to Distribute Teramind Spyware

Threat actors are deploying a new phishing campaign that uses fake Zoom and Google Meet…

3 hours ago

Phishing Schemes Abuse .arpa TLD and IPv6 Tunnels to Evade Detection

Cybersecurity researchers at Infoblox Threat Intel have uncovered a highly sophisticated phishing campaign that exploits…

3 hours ago

This website uses cookies.