top | item 43761094

Offical XRP NPM package has been compromised and key stealing malware introduced

55 points| flxga | 10 months ago |aikido.dev

17 comments

order

koolba|10 months ago

That fetch(…) is sending the mnemonic of the private key out to that remote server.

Interestingly if this is happening in a long running process and that exploit server is offline, the promise for the fetch will reject. And the default behavior for unhandled promise rejections would be for the node process to crash.

So if anybody tried testing this version of the library in a net gapped environment, it would crash and fail out in CI.

The attacker should have silenced the error with a .catch(_ => {}).

tobyhinloopen|10 months ago

Fun fact: installing some common starter packages will explode to install over a 1000 npm packages, each of them can inject malware, even if the package isn’t used, and you’ll never know.

Many packages will have over a 100 dependencies if you include the dev dependencies, so you can easily break a 1000.

tough|10 months ago

does the postinstall script step has anything to do with this?

i noticed bun doesn't run them by default unless you whitelist them

mouse_|10 months ago

That is a very fun fact.

nailer|10 months ago

Yes that is how dependencies work.

mschuster91|10 months ago

> Previously only the packed JavaScript code had been modified.

Honestly it's time for the npm ecosystem to move to a model where only build agents running on npm's own infrastructure can upload binary artifacts, or to mandate reproducible builds.

And for a select set of highly used packages, someone from NPM should be paid to look over each release's changeset.

Both would have massively impeded the attacker.

MichealCodes|10 months ago

Cryptocurrency packages used at scale should have wallet decoys setup for early detection of vulnerabilities like this.

nailer|10 months ago

Red teaming this, you’d delay exfiltration of the private key until the balance passes beyond a certain amount and you’re on mainnet.

abhisek|10 months ago

We run similar npm package monitors. The use of exotic tld domains such as 0x9c.xyz kind of gave it away because YARA Forge rules have native signatures to detect such domains.

It will be interesting t explore how the project got compromised and malicious packages published to the registry.

nailer|10 months ago

.xyz isn’t exotic for blockchains.

ohgr|10 months ago

I see the model of "download any old shit off the internet and run it in production" is working out so well.

nailer|10 months ago

I don’t have much opinion of XRP but this is their official package, not a community package.