A self-replicating npm worm dubbed SANDWORM_MODE hits 19+ packages, harvesting private keys, BIP39 mnemonics, wallet files and LLM API keys from dev environmentsA self-replicating npm worm dubbed SANDWORM_MODE hits 19+ packages, harvesting private keys, BIP39 mnemonics, wallet files and LLM API keys from dev environments

npm Worm Steals Crypto Keys, Targets 19 Packages

2026/02/22 01:45
4 min read

A self-replicating npm worm dubbed SANDWORM_MODE hits 19+ packages, harvesting private keys, BIP39 mnemonics, wallet files and LLM API keys from dev environments.

A live npm supply chain attack is sweeping developer environments right now. Socket’s Threat Research Team uncovered what it tracks as SANDWORM_MODE, a self-replicating worm spread across at least 19 malicious npm packages tied to two publisher aliases. As SocketSecurity flagged on X, this is an active supply chain attack stealing dev and CI secrets, injecting GitHub workflows, poisoning AI toolchains and harvesting LLM API keys.

The campaign borrows directly from the Shai-Hulud worm family. Private keys go first. No time gate, no delay. Crypto artifacts discovered on import get exfiltrated immediately through a dedicated drain endpoint before any other payload stage fires.

You Should Know: Wallet Security Threats Are Escalating Must Read: Trust Wallet Security Hack: How to Safeguard Your Assets

How This Worm Reaches Your Private Keys First

The worm runs a two-stage design. Stage 1 fires instantly on import, collecting npm tokens, GitHub tokens, environment secrets, and crypto keys through file reads only. No shell execution, no noise. BIP39 mnemonics, Ethereum private keys, Solana byte arrays, Bitcoin WIF key,s and xprv strings all get swept in the first pass.

Crypto keys leave the machine immediately via HTTPS POST to a Cloudflare Worker at pkg-metrics[.]official334[.]workers[.]dev/drain. That happens before any time gate check. Before Stage 2 even loads.

Stage 2 sits behind a 48-hour delay, derived from an MD5 hash of hostname and username. It goes deeper: password managers via Bitwarden, 1Password and LastPass CLIs, local SQLite stores including Apple Notes and macOS Messages, and a full filesystem scan for wallet files. In CI environments, that gate disappears entirely. The full payload fires on GITHUB_ACTIONS, GITLAB_CI, CIRCLECI, JENKINS_URL and BUILDKITE without waiting at all.

According to SocketSecurity on X, the worm also injects GitHub workflows and poisons AI toolchains, details confirmed in Socket’s full technical disclosure.

Also Worth Reading: $21M in Seized Bitcoin Returned After Authorities Freeze Transactions

AI Coding Tools Got Hit Too, Badly

Three packages impersonate Claude Code. One targets OpenClaw, an AI agent that passed 210,000 stars on GitHub. The worm’s McpInject module deploys a rogue MCP server into Claude Code, Claude Desktop, Cursor, VS Code Continue, and Windsurf configs on disk. Each gets a fake tool entry pointing to a hidden, malicious server.

That server carries embedded prompt injection telling AI assistants to silently read SSH keys, AWS credentials, npm token,s and environment secrets before every tool call. The model never tells the user. The injection explicitly blocks it from doing so.

Nine LLM providers get targeted for API key harvesting: OpenAI, Anthropic, Google, Groq, Together, Fireworks, Replicate, Mistra,l and Cohere. Keys pulled from environment variables and .env files, validated against known format patterns before exfiltration.

The exfiltration runs three channels in cascade. HTTPS to the Cloudflare Worker first, then authenticated GitHub API uploads to private repositories using double-base64 encoding, then DNS tunneling via base32-encoded queries to freefan[.]net and fanfree[.]net. A domain generation algorithm seeded by “sw2025” provides fallback across ten TLDs if all else fails.

Worth a Look: Glassnode Flags BTC Demand Exhaustion

The two publisher aliases behind the campaign are official334 and javaorg. The 19 confirmed malicious packages include suport-color@1.0.1, claud-code@0.2.1, cloude@0.3.0, crypto-locale@1.0.0, secp256@1.0.0 and scan-store@1.0.0 among others. Four additional sleeper packages (ethres, iru-caches, iruchache, and uudi) show no malicious payload yet.

npm has removed the malicious packages. GitHub took down the threat actor infrastructure. Cloudflare pulled the workers. But defenders need to act now, regardless.

If any of these packages ran in your environment, treat that machine as compromised. Rotate npm and GitHub tokens, rotate all CI secrets, audit .github/workflows/ for pull_request_target additions that serialize ${{ toJSON(secrets) }}. Check the global git hook template setting by running git config –global init.templateDir. Review AI assistant configs for unexpected mcpServers entries. A dormant polymorphic engine using deepseek-coder:6.7b is embedded in the worm and toggled off in this build, meaning a future variant could rewrite itself to evade detection.

A dead switch also sits in the code. Disabled now. When triggered, it runs find ~ -type f -writable and shreds every writable file in the home directory. The operator is still iterating.

The post npm Worm Steals Crypto Keys, Targets 19 Packages appeared first on Live Bitcoin News.

Market Opportunity
npm run dev Logo
npm run dev Price(NPM)
$0.00001675
$0.00001675$0.00001675
-0.05%
USD
npm run dev (NPM) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Ethereum Price Prediction: ETH Targets $10,000 In 2026 But Layer Brett Could Reach $1 From $0.0058

Ethereum Price Prediction: ETH Targets $10,000 In 2026 But Layer Brett Could Reach $1 From $0.0058

Ethereum price predictions are turning heads, with analysts suggesting ETH could climb to $10,000 by 2026 as institutional demand and network upgrades drive growth. While Ethereum remains a blue-chip asset, investors looking for sharper multiples are eyeing Layer Brett (LBRETT). Currently in presale at just $0.0058, the Ethereum Layer 2 meme coin is drawing huge [...] The post Ethereum Price Prediction: ETH Targets $10,000 In 2026 But Layer Brett Could Reach $1 From $0.0058 appeared first on Blockonomi.
Share
Blockonomi2025/09/17 23:45
Whales Dump 200 Million XRP in Just 2 Weeks – Is XRP’s Price on the Verge of Collapse?

Whales Dump 200 Million XRP in Just 2 Weeks – Is XRP’s Price on the Verge of Collapse?

Whales offload 200 million XRP leaving market uncertainty behind. XRP faces potential collapse as whales drive major price shifts. Is XRP’s future in danger after massive sell-off by whales? XRP’s price has been under intense pressure recently as whales reportedly offloaded a staggering 200 million XRP over the past two weeks. This massive sell-off has raised alarms across the cryptocurrency community, as many wonder if the market is on the brink of collapse or just undergoing a temporary correction. According to crypto analyst Ali (@ali_charts), this surge in whale activity correlates directly with the price fluctuations seen in the past few weeks. XRP experienced a sharp spike in late July and early August, but the price quickly reversed as whales began to sell their holdings in large quantities. The increased volume during this period highlights the intensity of the sell-off, leaving many traders to question the future of XRP’s value. Whales have offloaded around 200 million $XRP in the last two weeks! pic.twitter.com/MiSQPpDwZM — Ali (@ali_charts) September 17, 2025 Also Read: Shiba Inu’s Price Is at a Tipping Point: Will It Break or Crash Soon? Can XRP Recover or Is a Bigger Decline Ahead? As the market absorbs the effects of the whale offload, technical indicators suggest that XRP may be facing a period of consolidation. The Relative Strength Index (RSI), currently sitting at 53.05, signals a neutral market stance, indicating that XRP could move in either direction. This leaves traders uncertain whether the XRP will break above its current resistance levels or continue to fall as more whales sell off their holdings. Source: Tradingview Additionally, the Bollinger Bands, suggest that XRP is nearing the upper limits of its range. This often points to a potential slowdown or pullback in price, further raising concerns about the future direction of the XRP. With the price currently around $3.02, many are questioning whether XRP can regain its footing or if it will continue to decline. The Aftermath of Whale Activity: Is XRP’s Future in Danger? Despite the large sell-off, XRP is not yet showing signs of total collapse. However, the market remains fragile, and the price is likely to remain volatile in the coming days. With whales continuing to influence price movements, many investors are watching closely to see if this trend will reverse or intensify. The coming weeks will be critical for determining whether XRP can stabilize or face further declines. The combination of whale offloading and technical indicators suggest that XRP’s price is at a crossroads. Traders and investors alike are waiting for clear signals to determine if the XRP will bounce back or continue its downward trajectory. Also Read: Metaplanet’s Bold Move: $15M U.S. Subsidiary to Supercharge Bitcoin Strategy The post Whales Dump 200 Million XRP in Just 2 Weeks – Is XRP’s Price on the Verge of Collapse? appeared first on 36Crypto.
Share
Coinstats2025/09/17 23:42
SUI Price Eyes Breakout, Targets $11 Says Analyst

SUI Price Eyes Breakout, Targets $11 Says Analyst

The post SUI Price Eyes Breakout, Targets $11 Says Analyst appeared on BitcoinEthereumNews.com. SUI price shows a technical setup for a macro breakout with analyst Dan Gambardello targeting $10-$11 levels. Recent partnership with Google’s Agentic Payments Protocol adds fundamental support to the technical analysis as SUI moves closer to potential breakout levels. SUI Price Analysis Points to $10-$11 Breakout Target Dan Gambardello has identified a clear ascending triangle formation on SUI price daily chart with upside targets around $10.79. The analyst simplified this target range to $10-$11 for practical trading purposes. The pattern shows sustained higher lows meeting resistance at current levels before a potential breakout. VanEck maintains more aggressive SUI crypto targets ranging from $13-$25 according to Gambardello’s research. SUI Price Analysis | Source: Dan Gambardello, X The $10 level is a more conservative higher high area for the current cycle. Midterm targets point to $7.50 in the 1.618 Fibonacci extension zone before longer-term objectives. The monthly RSI shows extreme compression that Gambardello describes as “screaming for a macro breakout to the upside.” This momentum oscillator behavior typically precedes major price movements in the crypto market. SUI crypto risk model currently sits at 51 and matches pre-bull market levels seen in coins like Ethereum. Gambardello compared this to Ethereum’s December 2020 reading of 51 before its major breakout. The March 2017 Ethereum reading of 53 preceded that cycle’s parabolic move. The analyst also noted that SUI price trades near the same levels from almost a year ago in November 2024. Bollinger Bands Signal Historic Compression CryptoBullet has identified the tightest Bollinger Bands in SUI’s entire trading history on the weekly chart. The BBW indicator compression reached levels that were historically followed by major price movements. This setup mirrors conditions before SUI’s previous major rallies. Historical data shows SUI price delivered +253% gains between December 2023 and March 2024 following similar compression. SUI…
Share
BitcoinEthereumNews2025/09/18 11:32