🧠 In a serious development, cybersecurity company Safety discovered on July 31 that a malicious software generated by artificial intelligence was hiding itself within a package on the NPM platform named @kodane/patch-manager, and it steals crypto wallets upon installation! 😱
---
🔍 How does the software work?
🔧 When installing the package:
Files like monitor.js, sweeper.js, and utils.js are activated automatically
Files are secretly stored on Linux, Windows, and macOS devices
connection-pool.js acts as a persistent connection to an external server (C2)
transaction-cache.js looks for cryptocurrency wallet files and then initiates the 'dumping' and stealing of balances 💸
💡 Transfers were conducted via an encrypted RPC point to an address on the Solana blockchain.
---
📦 Smart obfuscation and real danger!
The package appeared to be a normal development tool
It was downloaded more than 1,500 times before being discovered and removed on July 30 😨
It directly targeted software developers and users of their applications
---
🛡️ Who is behind the protection?
Safety, a Canadian company relying on artificial intelligence systems to monitor open-source updates, discovered the package within an analysis mechanism covering millions of packages monthly. Its tools are used by giant companies and government agencies, revealing threats 4 times more than public sources. 🔐
---
⚠️ What should be done?
✅ If you are a developer:
Check your installation logs and look for any trace of the package @kodane/patch-manager
Scan your device for the mentioned files
Do not install untrusted or unknown packages, even if they seem normal
🧯 In case of suspected theft:
Disconnect the internet immediately
Transfer your assets from the infected wallets to new secure wallets
Report the incident to protection platforms
📢 Share this post with developers you know — because a minute of delay could mean an empty wallet!