Advertise
CoinTrust
BTC
ETH
BCH
SOL
DOGE
SHIB
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market Cap
  • Learn
    • Buying Crypto
    • Crypto Mining
    • Crypto Exchanges
    • Knowledge
  • Crypto Casinos
    • Bitcoin Casinos
    • New Crypto Casinos
    • No KYC Crypto Casinos
    • Anonymous Crypto Casinos
    • VPN Friendly Crypto Casinos
    • Bitcoin Poker
    • Crypto Poker
    • Bitcoin Bingo
    • USDT Casinos
    • Offshore Online Casinos
    • Bitcoin Betting Sites
    • Crypto Sports Betting
    • Reddit’s Best Bitcoin and Crypto Casinos
No Result
View All Result
CoinTrust
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market Cap
  • Learn
    • Buying Crypto
    • Crypto Mining
    • Crypto Exchanges
    • Knowledge
  • Crypto Casinos
    • Bitcoin Casinos
    • New Crypto Casinos
    • No KYC Crypto Casinos
    • Anonymous Crypto Casinos
    • VPN Friendly Crypto Casinos
    • Bitcoin Poker
    • Crypto Poker
    • Bitcoin Bingo
    • USDT Casinos
    • Offshore Online Casinos
    • Bitcoin Betting Sites
    • Crypto Sports Betting
    • Reddit’s Best Bitcoin and Crypto Casinos
No Result
View All Result
CoinTrust
No Result
View All Result

Home » Blockchain Meets Malware: New NPM Supply Chain Attack Exposes Vulnerabilities

Blockchain Meets Malware: New NPM Supply Chain Attack Exposes Vulnerabilities

Unique Attack Leveraging Blockchain for Command-and-Control

Kelly Cromley by Kelly Cromley
Nov 5, 2024
in Market News, News
Reading Time: 3 mins read
0
Node Package Manager (NPM)

Researchers from Checkmarx recently uncovered a sophisticated supply chain attack within the Node Package Manager (NPM) ecosystem, blending traditional malware tactics with blockchain-based command-and-control (C2) operations. This attack, marked by its use of the Ethereum blockchain, reveals an evolving threat in the software development sector, targeting developers through a malicious package disguised as a legitimate JavaScript testing tool.

This malicious package, named “jest-fet-mock,” was engineered to deceive developers by imitating a well-known testing utility. Designed with a multi-platform malware structure, the attack exploits Ethereum smart contracts as a unique C2 mechanism. Checkmarx researchers noted that while blockchain technology is generally used to support decentralized applications and digital assets, its integration into malware strategies represents a significant innovation in cyber threat tactics.

Attack Mechanics and Deceptive Distribution Techniques

The package, “jest-fet-mock,” surfaced in mid-October and masquerades as a JavaScript utility, using the typosquatting technique to target developers. By subtly misspelling the package name “fetch-mock-jest” as “fet,” the attackers crafted a near-perfect imitation of popular packages such as “fetch-mock-jest” and “Jest-Fetch-Mock.” The former attracts roughly 200,000 downloads per week, while the latter reaches over a million weekly downloads, making them prime targets for impersonation. This small typo could easily trick developers into downloading the malicious package, unaware of its hidden agenda.

Once installed, the malicious package leverages NPM preinstall scripts to execute harmful code on targeted systems, including Windows, Linux, and macOS platforms. It then initiates info-stealing functions, which allow the malware to access sensitive information within the development environment. This malware secures persistence through customized system mechanisms, remaining active even after initial installation. All variations of the package communicate with a remote C2 server, where attackers can monitor infected systems and escalate the attack.

Ethereum’s Role in Command-and-Control Operations

In an unusual twist, the attackers utilize the Ethereum blockchain to establish C2 communication, marking one of the first times this method has appeared in the NPM ecosystem. An Ethereum smart contract associated with the attack, located at the address “0xa1b40044EBc2794f207D45143Bd82a1B86156c6b,” uses its “getString” function to distribute C2 server addresses to infected systems. This blockchain-based approach leverages the security and decentralized nature of blockchain, which makes it difficult for traditional cybersecurity tools to detect or remove. This innovation allows attackers to maintain a resilient C2 infrastructure, immune to takedowns and monitoring due to blockchain’s immutability.

Threat Analysis and Response Challenges

Further analysis from Checkmarx revealed that the malware variants were crafted for specific operating systems, each with unique SHA-256 identifiers:

Windows: df67a118cacf68ffe5610e8acddbe38db9fb702b473c941f4ea0320943ef32ba

Linux: 0801b24d2708b3f6195c8156d3661c027d678f5be064906db4fefe74e1a74b17

macOS: 3f4445eaf22cf236b5aeff5a5c24bf6dbc4c25dc926239b8732b351b09698653

These malware samples have yet to be flagged as malicious by the security detection tools available on VirusTotal, allowing the attack to evade conventional detection methods. This undetected presence poses an ongoing risk to development environments, as NPM utilities are often integrated into critical Continuous Integration and Continuous Deployment (CI/CD) pipelines. This attack could enable threat actors to infiltrate CI/CD processes, potentially compromising entire software supply chains.

In addition to Checkmarx’s findings, Phylum and Socket have reported further malicious packages linked to this campaign, indicating a larger, escalating threat within the NPM ecosystem. The attackers’ use of blockchain as a C2 mechanism reflects an evolution in supply chain attack strategies that outpaces many traditional cybersecurity approaches, which may struggle to monitor or intercept blockchain-based communications effectively.

Mitigation and Vigilance for Development Teams

This attack underscores the importance of enhanced security practices for software development teams. Given the campaign’s sophisticated deception techniques and its use of blockchain infrastructure, developers are urged to rigorously review their package management practices. Experts recommend verifying the authenticity of testing utilities and implementing strict security protocols to prevent similar intrusions.

In response to this incident, Checkmarx emphasizes the need for more robust security measures across development environments to combat such advanced supply chain attacks. By understanding the vulnerabilities exposed by “jest-fet-mock” and similar packages, organizations can better protect their CI/CD workflows and overall software supply chain integrity. This attack represents a significant warning to the industry, urging vigilance as attackers leverage emerging technologies like blockchain to create more resilient and elusive cyber threats.

Previous Post

BC.Game Elevates Online Gaming with Crypto and Blockchain Integration

Next Post

Inscription Alliance’s BTIA Token Gains Momentum with Cross-Chain Innovations

Related Posts

ripple decentralized ledger

AMINA Bank Integrates Ripple to Modernize Cross-Border Payments

by Kelly Cromley
Dec 13, 2025
0

AMINA Bank, a Switzerland-based financial institution regulated by FINMA, has implemented Ripple Payments to improve how transactions flow between blockchain...

chainlink

MapleStory Universe Adopts Chainlink for Cross-Chain Gaming

by Kelly Cromley
Dec 13, 2025
0

MapleStory Universe, a blockchain-based gaming platform that enables players to create and monetize their own interactive experiences, has revealed its...

chainbase

Chainbase and OpenLedger Join Forces to Advance AI-Driven Web3

by Kelly Cromley
Dec 13, 2025
0

Chainbase, widely recognized for its omnichain data ecosystem designed for artificial intelligence, has announced a strategic collaboration with OpenLedger, a...

deepsafe partners with arc

DeepSafe, ARC Matrix Launch Privacy-First Web3 Security Framework

by Kelly Cromley
Dec 12, 2025
0

DeepSafe, a decentralized cryptographic verification layer designed for Web3 and artificial intelligence ecosystems, has announced a formal alignment with ARC...

Italy

Italy Debuts First Public-Chain Tokenized Minibond

by Kelly Cromley
Dec 12, 2025
0

Italy has taken a decisive step toward modernizing its capital markets with the launch of the country’s first minibond fully...

U.S. Securities and Exchange Commission (SEC)

SEC Approves DTCC Pilot to Tokenize U.S. Securities on Blockchains

by Kelly Cromley
Dec 12, 2025
0

The U.S. Securities and Exchange Commission has authorized a three-year pilot program allowing the clearinghouse responsible for nearly all equity...

Next Post
inscription alliance btia token cross chain innovation

Inscription Alliance’s BTIA Token Gains Momentum with Cross-Chain Innovations

  • Collé Ai

    Collé: Pioneering AI Web3 Platform Receives Investment Boost from BlackRock

    by Kelly Cromley
    May 13, 2024
  • Router Protocol and OpenWorldSwap Partnership to Revolutionize DEX Market

    by Kelly Cromley
    Aug 6, 2024
  • Hyper Foundation Launched to Boost Hyperliquid Blockchain Development

    by Kelly Cromley
    Oct 15, 2024
  • SmarTrust Brings Blockchain-Powered Escrow to Freelancers

    by Kelly Cromley
    May 1, 2025
  • Blockchain Based Sports Platform SportsMint Unveiled

    by Kelly Cromley
    Apr 30, 2024

Recent News

ripple decentralized ledger
Market News

AMINA Bank Integrates Ripple to Modernize Cross-Border Payments

by Kelly Cromley
Dec 13, 2025
chainlink
Market News

MapleStory Universe Adopts Chainlink for Cross-Chain Gaming

by Kelly Cromley
Dec 13, 2025
chainbase
Market News

Chainbase and OpenLedger Join Forces to Advance AI-Driven Web3

by Kelly Cromley
Dec 13, 2025
deepsafe partners with arc
Market News

DeepSafe, ARC Matrix Launch Privacy-First Web3 Security Framework

by Kelly Cromley
Dec 12, 2025
Italy
Market News

Italy Debuts First Public-Chain Tokenized Minibond

by Kelly Cromley
Dec 12, 2025

Categories

  • Altcoin News
  • Analysis News
  • Binance Coin News
  • Bitcoin News
  • Blog
  • Cardano News
  • Ethereum News
  • ICO News
  • Legislation News
  • Market Forecasts
  • Market News
  • News
  • Ripple News
  • Solana News
  • Tether News
  • XRP
Trustpilot

Cointrust

  • About Us
  • Contact Us
  • Correction Request
  • Our Team

Legal

  • Disclaimer
  • Terms & Conditions
  • Privacy Policy
  • Cookie Policy

Popular

  • ICO Listings
  • Knowledge Base
  • All about Mining
  • Cryptocurrency Exchanges
  • How and Where to buy Cryptocurrency

Sitemap

  • News section
  • Sitemap
  • XML Sitemap

© 2024 CoinTrust.com.

CoinTrustCoinTrust

* DISCLAIMER: All information provided in CoinTrust is merely for informational purposes, we are not an investment advisor and not affiliated with any companies or ICO/Cryptocurrency Projects. To use this website you must accept our cookie policy, Disclaimer and Privacy Policies.

No Result
View All Result
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market Cap
  • Learn
    • Buying Crypto
    • Crypto Mining
    • Crypto Exchanges
    • Knowledge
  • Crypto Casinos
    • Bitcoin Casinos
    • New Crypto Casinos
    • No KYC Crypto Casinos
    • Anonymous Crypto Casinos
    • VPN Friendly Crypto Casinos
    • Bitcoin Poker
    • Crypto Poker
    • Bitcoin Bingo
    • USDT Casinos
    • Offshore Online Casinos
    • Bitcoin Betting Sites
    • Crypto Sports Betting
    • Reddit’s Best Bitcoin and Crypto Casinos

© 2024 CoinTrust.com.

We use cookies to ensure that we give you the best experience on our website.
If you continue to use this site you agree to allow us to use cookies, in accordance with our Cookie Policy.