Binance Square

exoduswallet

1,958 views
9 Discussing
Shadow_crypto
--
Guys guess What?? I've got scammed!! i as holding 12$ of LTC in my exodus wallet suddenly an unauthorised transaction happens and all my LTC goes to an unknown wallet! aren't trusty wallets security too low now ?? i was saving that from months now I've 0! $LTC #Scam? #exoduswallet any helps are appreciated!! 👍
Guys guess What??

I've got scammed!! i as holding 12$ of LTC in my exodus wallet suddenly an unauthorised transaction happens and all my LTC goes to an unknown wallet! aren't trusty wallets security too low now ?? i was saving that from months now I've 0! $LTC #Scam? #exoduswallet

any helps are appreciated!! 👍
🚨 ALERT: North Korean Hackers Target Crypto Developers & Solana Wallets! 🚨A new Lazarus Group campaign is making waves in the crypto world, using infected npm packages to steal sensitive credentials and drain cryptocurrency wallets. 🛑 🎯 Who’s at Risk? 🔹 Software Developers working with npm packages 🔹 Solana & Exodus Wallet Users 🔹 Browser Users on Chrome, Brave & Firefox 💀 How the Attack Works The North Korean state-backed Lazarus Group has planted six malicious npm packages, disguising them as useful tools. These infected packages—downloaded over 300 times—deploy BeaverTail malware, which: ✔ Steals login credentials ✔ Extracts cryptocurrency wallet data ✔ Deploys persistent backdoors ⚠ Malicious npm Packages Identified 🚫 is-buffer-validator 🚫 yoojae-validator 🚫 event-handle-package 🚫 array-empty-validator 🚫 react-event-dependency 🚫 auth-validator These packages use typosquatting, a technique where hackers slightly misspell legitimate package names to trick developers into installing them. 📡 Where the Stolen Data Goes Once installed, the malware scans files, extracts keychain data on macOS, and sends everything to a hardcoded command-and-control server at: hxxp://172.86.84[.]38:1224/uploads 🔥 Lazarus Group: A Repeat Offender This isn’t Lazarus’s first rodeo. The group previously used npm, GitHub, and PyPI supply chain attacks to infiltrate networks, leading to multi-billion-dollar hacks, including: 💰 $1.46 Billion Bybit Exchange Heist in February 2025 💰 Multiple DeFi and exchange breaches worldwide 🛡 How to Protect Yourself ✅ Avoid installing npm packages with unknown or misspelled names ✅ Verify package sources before downloading ✅ Use security tools to scan for malware in dependencies ✅ Regularly update your crypto wallet security settings 🌍 Global Response & Investigations 🔎 European watchdogs are investigating OKX’s Web3 services for possible links to Lazarus activities. 🔎 Crypto exchanges are tightening security to prevent further state-sponsored cyber attacks. 🚀 The Bottom Line As crypto adoption grows, cyber threats are evolving. Stay vigilant, double-check your downloads, and keep your funds secure! 💬 Have you encountered any suspicious npm packages recently? Share your thoughts below! 👇 🔗 #LazarusGroup #cryptohacks #solana #exoduswallet #UkraineRussiaCeasefire

🚨 ALERT: North Korean Hackers Target Crypto Developers & Solana Wallets! 🚨

A new Lazarus Group campaign is making waves in the crypto world, using infected npm packages to steal sensitive credentials and drain cryptocurrency wallets. 🛑

🎯 Who’s at Risk?
🔹 Software Developers working with npm packages

🔹 Solana & Exodus Wallet Users

🔹 Browser Users on Chrome, Brave & Firefox

💀 How the Attack Works
The North Korean state-backed Lazarus Group has planted six malicious npm packages, disguising them as useful tools. These infected packages—downloaded over 300 times—deploy BeaverTail malware, which:

✔ Steals login credentials

✔ Extracts cryptocurrency wallet data

✔ Deploys persistent backdoors

⚠ Malicious npm Packages Identified
🚫 is-buffer-validator

🚫 yoojae-validator

🚫 event-handle-package

🚫 array-empty-validator

🚫 react-event-dependency

🚫 auth-validator

These packages use typosquatting, a technique where hackers slightly misspell legitimate package names to trick developers into installing them.

📡 Where the Stolen Data Goes
Once installed, the malware scans files, extracts keychain data on macOS, and sends everything to a hardcoded command-and-control server at:

hxxp://172.86.84[.]38:1224/uploads

🔥 Lazarus Group: A Repeat Offender
This isn’t Lazarus’s first rodeo. The group previously used npm, GitHub, and PyPI supply chain attacks to infiltrate networks, leading to multi-billion-dollar hacks, including:

💰 $1.46 Billion Bybit Exchange Heist in February 2025

💰 Multiple DeFi and exchange breaches worldwide

🛡 How to Protect Yourself
✅ Avoid installing npm packages with unknown or misspelled names

✅ Verify package sources before downloading

✅ Use security tools to scan for malware in dependencies

✅ Regularly update your crypto wallet security settings

🌍 Global Response & Investigations
🔎 European watchdogs are investigating OKX’s Web3 services for possible links to Lazarus activities.

🔎 Crypto exchanges are tightening security to prevent further state-sponsored cyber attacks.

🚀 The Bottom Line
As crypto adoption grows, cyber threats are evolving. Stay vigilant, double-check your downloads, and keep your funds secure!

💬 Have you encountered any suspicious npm packages recently? Share your thoughts below! 👇

🔗 #LazarusGroup #cryptohacks #solana #exoduswallet #UkraineRussiaCeasefire
the Lazarus Group injected harmful Javascript into Github projects under the pseudonym “Successfriend,” while subverting NPM tools relied on by blockchain engineers. Codenamed “Operation Marstech Mayhem,” the initiative exploits weaknesses in software supply chains to disseminate the Marstech1 malware, designed to infiltrate wallets such as Metamask, Exodus, and Atomic. #atomicwallet #MetaMask #exoduswallet
the Lazarus Group injected harmful Javascript into Github projects under the pseudonym “Successfriend,” while subverting NPM tools relied on by blockchain engineers. Codenamed “Operation Marstech Mayhem,” the initiative exploits weaknesses in software supply chains to disseminate the Marstech1 malware, designed to infiltrate wallets such as Metamask, Exodus, and Atomic.
#atomicwallet #MetaMask #exoduswallet
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number