A self-replicating npm worm dubbed SANDWORM_MODE hits 19+ packages, harvesting private keys, BIP39 mnemonics, wallet files and LLM API keys from dev environmentsA self-replicating npm worm dubbed SANDWORM_MODE hits 19+ packages, harvesting private keys, BIP39 mnemonics, wallet files and LLM API keys from dev environments

npm Worm Steals Crypto Keys, Targets 19 Packages

2026/02/22 01:45
4 min read

A self-replicating npm worm dubbed SANDWORM_MODE hits 19+ packages, harvesting private keys, BIP39 mnemonics, wallet files and LLM API keys from dev environments.

A live npm supply chain attack is sweeping developer environments right now. Socket’s Threat Research Team uncovered what it tracks as SANDWORM_MODE, a self-replicating worm spread across at least 19 malicious npm packages tied to two publisher aliases. As SocketSecurity flagged on X, this is an active supply chain attack stealing dev and CI secrets, injecting GitHub workflows, poisoning AI toolchains and harvesting LLM API keys.

The campaign borrows directly from the Shai-Hulud worm family. Private keys go first. No time gate, no delay. Crypto artifacts discovered on import get exfiltrated immediately through a dedicated drain endpoint before any other payload stage fires.

You Should Know: Wallet Security Threats Are Escalating Must Read: Trust Wallet Security Hack: How to Safeguard Your Assets

How This Worm Reaches Your Private Keys First

The worm runs a two-stage design. Stage 1 fires instantly on import, collecting npm tokens, GitHub tokens, environment secrets, and crypto keys through file reads only. No shell execution, no noise. BIP39 mnemonics, Ethereum private keys, Solana byte arrays, Bitcoin WIF key,s and xprv strings all get swept in the first pass.

Crypto keys leave the machine immediately via HTTPS POST to a Cloudflare Worker at pkg-metrics[.]official334[.]workers[.]dev/drain. That happens before any time gate check. Before Stage 2 even loads.

Stage 2 sits behind a 48-hour delay, derived from an MD5 hash of hostname and username. It goes deeper: password managers via Bitwarden, 1Password and LastPass CLIs, local SQLite stores including Apple Notes and macOS Messages, and a full filesystem scan for wallet files. In CI environments, that gate disappears entirely. The full payload fires on GITHUB_ACTIONS, GITLAB_CI, CIRCLECI, JENKINS_URL and BUILDKITE without waiting at all.

According to SocketSecurity on X, the worm also injects GitHub workflows and poisons AI toolchains, details confirmed in Socket’s full technical disclosure.

Also Worth Reading: $21M in Seized Bitcoin Returned After Authorities Freeze Transactions

AI Coding Tools Got Hit Too, Badly

Three packages impersonate Claude Code. One targets OpenClaw, an AI agent that passed 210,000 stars on GitHub. The worm’s McpInject module deploys a rogue MCP server into Claude Code, Claude Desktop, Cursor, VS Code Continue, and Windsurf configs on disk. Each gets a fake tool entry pointing to a hidden, malicious server.

That server carries embedded prompt injection telling AI assistants to silently read SSH keys, AWS credentials, npm token,s and environment secrets before every tool call. The model never tells the user. The injection explicitly blocks it from doing so.

Nine LLM providers get targeted for API key harvesting: OpenAI, Anthropic, Google, Groq, Together, Fireworks, Replicate, Mistra,l and Cohere. Keys pulled from environment variables and .env files, validated against known format patterns before exfiltration.

The exfiltration runs three channels in cascade. HTTPS to the Cloudflare Worker first, then authenticated GitHub API uploads to private repositories using double-base64 encoding, then DNS tunneling via base32-encoded queries to freefan[.]net and fanfree[.]net. A domain generation algorithm seeded by “sw2025” provides fallback across ten TLDs if all else fails.

Worth a Look: Glassnode Flags BTC Demand Exhaustion

The two publisher aliases behind the campaign are official334 and javaorg. The 19 confirmed malicious packages include suport-color@1.0.1, claud-code@0.2.1, cloude@0.3.0, crypto-locale@1.0.0, secp256@1.0.0 and scan-store@1.0.0 among others. Four additional sleeper packages (ethres, iru-caches, iruchache, and uudi) show no malicious payload yet.

npm has removed the malicious packages. GitHub took down the threat actor infrastructure. Cloudflare pulled the workers. But defenders need to act now, regardless.

If any of these packages ran in your environment, treat that machine as compromised. Rotate npm and GitHub tokens, rotate all CI secrets, audit .github/workflows/ for pull_request_target additions that serialize ${{ toJSON(secrets) }}. Check the global git hook template setting by running git config –global init.templateDir. Review AI assistant configs for unexpected mcpServers entries. A dormant polymorphic engine using deepseek-coder:6.7b is embedded in the worm and toggled off in this build, meaning a future variant could rewrite itself to evade detection.

A dead switch also sits in the code. Disabled now. When triggered, it runs find ~ -type f -writable and shreds every writable file in the home directory. The operator is still iterating.

The post npm Worm Steals Crypto Keys, Targets 19 Packages appeared first on Live Bitcoin News.

Market Opportunity
npm run dev Logo
npm run dev Price(NPM)
$0.00001669
$0.00001669$0.00001669
-0.41%
USD
npm run dev (NPM) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

China Launches Cross-Border QR Code Payment Trial

China Launches Cross-Border QR Code Payment Trial

The post China Launches Cross-Border QR Code Payment Trial appeared on BitcoinEthereumNews.com. Key Points: Main event involves China initiating a cross-border QR code payment trial. Alipay and Ant International are key participants. Impact on financial security and regulatory focus on illicit finance. China’s central bank, led by Deputy Governor Lu Lei, initiated a trial of a unified cross-border QR code payment gateway with Alipay and Ant International as participants. This pilot addresses cross-border fund risks, aiming to enhance financial security amid rising money laundering through digital channels, despite muted crypto market reactions. China’s Cross-Border Payment Gateway Trial with Alipay The trial operation of a unified cross-border QR code payment gateway marks a milestone in China’s financial landscape. Prominent entities such as Alipay and Ant International are at the forefront, participating as the initial institutions in this venture. Lu Lei, Deputy Governor of the People’s Bank of China, highlighted the systemic risks posed by increased cross-border fund flows. Changes are expected in the dynamics of digital transactions, potentially enhancing transaction efficiency while tightening regulations around illicit finance. The initiative underscores China’s commitment to bolstering financial security amidst growing global fund movements. “The scale of cross-border fund flows is expanding, and the frequency is accelerating, providing opportunities for risks such as cross-border money laundering and terrorist financing. Some overseas illegal platforms transfer funds through channels such as virtual currencies and underground banks, creating a ‘resonance’ of risks at home and abroad, posing a challenge to China’s foreign exchange management and financial security.” — Lu Lei, Deputy Governor, People’s Bank of China Bitcoin and Impact of China’s Financial Initiatives Did you know? China’s latest initiative echoes the Payment Connect project of June 2025, furthering real-time cross-boundary remittances and expanding its influence on global financial systems. As of September 17, 2025, Bitcoin (BTC) stands at $115,748.72 with a market cap of $2.31 trillion, showing a 0.97%…
Share
BitcoinEthereumNews2025/09/18 05:28
GBP/USD has moved into a range-trading phase – UOB Group

GBP/USD has moved into a range-trading phase – UOB Group

The post GBP/USD has moved into a range-trading phase – UOB Group appeared on BitcoinEthereumNews.com. Pound Sterling (GBP) has moved into a range-trading phase; softening underlying tone suggests it is likely to test the lower end of the 1.3470/1.3650 range first, UOB Group’s FX analysts Quek Ser Leang and Peter Chia note. GBP/USD is likely to test the lower end of the 1.3470/1.3650 range 24-HOUR VIEW: “After GBP briefly rose to 1.3726 two days ago and then plummeted, we indicated yesterday that ‘the brief rise did not result in any increase in upward momentum.’ We were of the view that GBP ‘is likely to range-trade between 1.3600 and 1.3665.’ GBP subsequently edged up to 1.3661 and then plummeted to a low of 1.3534. While the sharp drop has scope to extend, the decline is quickly approaching oversold level, and any further downside is likely limited to a test of 1.3520. The next support at 1.3470 is unlikely to come into view. To keep the momentum, GBP must hold below 1.3600, with minor resistance at 1.3575.” 1-3 WEEKS VIEW: “Two days ago (17 Sep, spot at 1.3655), we highlighted that ‘there is room for further GBP gains toward 1.3700.’ We also highlighted that ‘the odds of an extended rise to 1.3765 are currently lower.’ After GBP rose to 1.3726 and then pulled back sharply, we highlighted yesterday (18 Sep, spot at 1.3635) that ‘there has been no further increase in upward momentum, and the odds of GBP rising to 1.3765 have diminished noticeably.’ We pointed out that ‘only a breach of 1.3575 (‘strong support’ level) would indicate that GBP has moved into a range-trading phase.’ GBP then breached 1.3575, dropping to a low of 1.3534. GBP appears to have moved into a range-trading phase, but the softening underlying tone suggests it is likely to test the lower end of the 1.3470/1.3650 range first.” Source: https://www.fxstreet.com/news/gbp-usd-has-moved-into-a-range-trading-phase-uob-group-202509191115
Share
BitcoinEthereumNews2025/09/19 23:04
XRP Price Prediction February 2026: Senator Warren Warns Fed as Pepeto’s 100x Presale Steals the Spotlight From Ripple

XRP Price Prediction February 2026: Senator Warren Warns Fed as Pepeto’s 100x Presale Steals the Spotlight From Ripple

Senator Elizabeth Warren reportedly sent a letter to Fed Chair Jerome Powell and Treasury Secretary Scott Bessent demanding they not […] The post XRP Price Prediction
Share
Coindoo2026/02/22 05:55