AI-Powered Malicious npm Package Steals Solana Funds from Over 1,500 Users Before Being Removed

Published:

spot_img

Rise of AI-Generated Malware: A New Threat in Cybersecurity

Introduction to AI-Driven Cyber Threats

Recent findings in the realm of cybersecurity have unveiled a concerning trend: the emergence of malicious npm packages crafted using artificial intelligence. Researchers have identified a specific package named @kodane/patch-manager, which was purportedly designed to offer advanced utilities for Node.js applications. However, it harbors a hidden agenda—acting as a cryptocurrency wallet drainer.

Details About the Malicious Package

Uploaded to the npm repository by a user identified as "Kodane" on July 28, 2025, this package quickly attracted attention, amassing over 1,500 downloads before being removed from the registry. The company Safety, which specializes in software supply chain security, highlighted that the malevolent features were embedded directly within the code, labelling it an "enhanced stealth wallet drainer."

How the Malware Operates

The core functionality of this malware is triggered by a postinstall script, which stealthily executes its payload across multiple operating systems, including Windows, Linux, and macOS. Once installed, it connects to a command-and-control (C2) server located at sweeper-monitor-production.up.railway.app. The script is particularly dangerous since it generates a unique machine ID code for the infected device and relays this information back to the C2 server, which sits ominously in the background monitoring compromised systems.

"Postinstall scripts often go unnoticed, running automatically after a package installation. This reality poses significant risks for users, especially in continuous integration and continuous deployment (CI/CD) environments where routine updates occur without thorough manual inspections," explains Paul McCarty, head of research at Safety.

Targeting Cryptocurrency Wallets

Once inside a system, the malware’s next step is to scan for cryptocurrency wallet files. If it locates one, the malware drains the wallet, redirecting all funds to a hard-coded address on the Solana blockchain. While cryptocurrency drainers have appeared in various open-source libraries before, @kodane/patch-manager stands out due to the indications that it was generated using Anthropic’s Claude AI chatbot.

Identifying the AI Influence

Evidence pointing to the use of Claude in developing this malicious package includes a notable incorporation of emojis, detailed JavaScript logging messages, and well-structured comments. The README.md file exhibits a writing style commonly associated with Claude-generated markdown content, characterized by elaborate descriptions and references to code improvements as "Enhanced."

Implications for Cybersecurity

The discovery of this AI-generated npm package has broad implications for cybersecurity strategies. It exemplifies how cybercriminals are harnessing artificial intelligence to create more effective and sophisticated malware. As McCarty notes, "This incident underscores the urgency of addressing the vulnerabilities inherent in software supply chain security."

The Need for Vigilance

With AI-generated packages potentially sidestepping traditional defense mechanisms by appearing benign or even functional, the stakes are higher than ever for both package maintainers and security teams. It is increasingly essential to monitor not just known malware but also polished, AI-assisted threats that could infiltrate trustworthy ecosystems like npm.

Conclusion: Navigating the New Cyber Landscape

As the threat landscape evolves, both developers and cybersecurity professionals must remain vigilant. The rise of AI-generated malware like @kodane/patch-manager is a stark reminder that vigilance, education, and proactive measures are paramount in safeguarding digital infrastructures against the changing face of cybercrime.

spot_img

Related articles

Recent articles

Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888)

Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888) The Qualys Threat Research Unit has uncovered a significant Local Privilege Escalation (LPE)...

IT/OT Convergence Reshapes Cybersecurity Priorities for Critical Operational Systems

IT/OT Convergence Reshapes Cybersecurity Priorities for Critical Operational Systems The convergence of Information Technology (IT) and Operational Technology (OT) is fundamentally altering the landscape of...

Cyberattacks Surge 245% Amid Iran War, Targeting Banks and Fintech Sectors

Cyberattacks Surge 245% Amid Iran War, Targeting Banks and Fintech Sectors Since the onset of the Iran war, cyber activity associated with the conflict has...

Cohesity Advances AI Resilience with Enhanced Data Protection and Security Solutions for Midsize Organizations

Cohesity Advances AI Resilience with Enhanced Data Protection and Security Solutions for Midsize Organizations Cohesity has unveiled a series of significant enhancements to its data...