By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
Computing

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

News Room
Last updated: 2026/03/24 at 9:03 AM
News Room Published 24 March 2026
Share
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
SHARE

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data.

The activity is being tracked by ReversingLabs as the Ghost campaign. The list of identified packages, all published by a user named mikilanjillo, is below –

  • react-performance-suite
  • react-state-optimizer-core
  • react-fast-utilsa
  • ai-fast-auto-trader
  • pkgnewfefame1
  • carbon-mac-copy-cloner
  • coinbase-desktop-sdk

“The packages themselves are phishing for sudo password with which the last stage is executed, and are trying to hide their real functionality and avoid detection in a sophisticated way: displaying fake npm install logs,” Lucija Valentić, software threat researcher at ReversingLabs, said in a report shared with The Hacker News.

The identified Node.js libraries, besides falsely claiming to download additional packages, insert random delays to give the impression that the installation process is underway. At one point during this step, the user is alerted that the installation is running into an error due to missing write permissions to “/usr/local/lib/node_modules,” which is the default location for globally installed Node.js packages on Linux and macOS systems.

It also instructs the victim to enter their root or administrator password to continue with the installation. Should they enter the password, the malware then silently retrieves the next-stage downloader, which then reaches out to a Telegram channel to fetch the URL for the final payload and the key required to decrypt it.

The attack culminates with the deployment of a remote access trojan that’s capable of harvesting data, targeting cryptocurrency wallets, and awaiting further instructions from an external server.

ReversingLabs said the activity shares overlaps with an activity cluster documented by JFrog under the name GhostClaw earlier this month, although it’s currently not known if it’s the work of the same threat actor or an entirely new campaign.

GhostClaw Uses GitHub Repositories and AI Workflows to Deliver macOS Stealer

Jamf Threat Labs, in an analysis published last week, said the GhostClaw campaign uses GitHub repositories and artificial intelligence (AI)-assisted development workflows to deliver credential-stealing payloads on macOS.

“These repositories impersonate legitimate tools, including trading bots, SDKs and developer utilities, and are designed to appear credible at a glance,” security researcher Thijs Xhaflaire said. “Several of the identified repositories have accumulated significant engagement, in some cases exceeding hundreds of stars, further reinforcing their perceived legitimacy.”

In this campaign, the repositories are initially populated with benign or partially functional code and left unchanged for an extended period of time to build trust among users before introducing malicious components. Specifically, the repositories feature a README file that guides developers to execute a shell script as part of the installation step.

A variant of these repositories feature a SKILL.md file, primarily targeting Al-oriented workflows under the guise of installing external skills through AI agents like OpenClaw. Regardless of the method used, the shell script initiates a multi-stage infection process that ends with the deployment of a stealer. The entire sequence of actions is as follows –

  • It identifies the host architecture and macOS version, checks if Node.js is already present, and installs a compatible version if required. The installation takes place in a user-controlled directory to avoid raising any red flags.
  • It invokes “node scripts/setup.js” and “node scripts/postinstall.js,” causing the execution to transition to JavaScript payloads, enabling it steal system credentials, deliver the GhostLoader malware by contacting a command-and-control (C2) server, and remove traces of malicious activity by clearing the Terminal.

The script also comes with an environment variable named “GHOST_PASSWORD_ONLY,” which, when set to zero, presents a full interactive installation flow, complete with progress indicators and user prompts. If it’s set to 1, the script launches a simplified execution path focused primarily on credential collection without any extra user interface elements.

Interestingly, in at least some cases, the “postinstall.js” script displays a benign success message, stating the installation was successful and that users can configure the library in their projects by running the “npx react-state-optimizer” command.

According to a report from cloud security company Panther last month, “react-state-optimizer” is one of several other npm packages published by “mikilanjillo,” indicating that the two clusters of activity are one and the same –

  • react-query-core-utils
  • react-state-optimizer
  • react-fast-utils
  • react-performance-suite
  • ai-fast-auto-trader
  • carbon-mac-copy-cloner
  • carbon-mac-copys-cloner
  • pkgnewfefame
  • darkslash

“The packages contain a CLI ‘setup wizard’ that tricks developers into entering their sudo password to perform ‘system optimizations,'” security researcher Alessandra Rizzo said. “The captured password is then passed to a comprehensive credential stealer payload that harvests browser credentials, cryptocurrency wallets, SSH keys, cloud provider configurations, and developer tool tokens.”

“Stolen data is routed to partner-specific Telegram bots based on a campaign identifier embedded in each loader, with credentials stored in the BSC smart contract and updated without modifying the malware itself.”

The initial npm package captures credentials and fetches configuration from either a Telegram channel or a Teletype.in page that’s disguised as blockchain documentation to deploy the stealer. Per Panther, the malware implements a dual revenue model, where the primary income is from credential theft relayed through partner Telegram channels, and the secondary income is through affiliate URL redirects stored in a separate Binance Smart Chain (BSC) smart contract.

“This campaign highlights a continued shift in attacker tradecraft, where distribution methods extend beyond traditional package registries into platforms such as GitHub and emerging AI-assisted development workflows,” Jamf said. “By leveraging trusted ecosystems and standard installation practices, attackers are able to introduce malicious code into environments with minimal friction.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The most innovative companies in Latin America for 2026 The most innovative companies in Latin America for 2026
Next Article 5 Clever Ways To Use Vibration Sensors Around The House – BGR 5 Clever Ways To Use Vibration Sensors Around The House – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Best Cordless Vacuum I've Tested Is on Sale for Just 3
The Best Cordless Vacuum I've Tested Is on Sale for Just $153
News
littlefish raises .5 million to scale its merchant operating system across Africa |
littlefish raises $9.5 million to scale its merchant operating system across Africa |
Computing
Nvidia’s Clawbots: The Hype Might Be Justified
Nvidia’s Clawbots: The Hype Might Be Justified
News
13 influencer marketing tools compared: 2026 guide
13 influencer marketing tools compared: 2026 guide
Computing

You Might also Like

littlefish raises .5 million to scale its merchant operating system across Africa |
Computing

littlefish raises $9.5 million to scale its merchant operating system across Africa |

5 Min Read
13 influencer marketing tools compared: 2026 guide
Computing

13 influencer marketing tools compared: 2026 guide

19 Min Read

How Meta’s Networks Amplify Holiday Creator Campaigns

5 Min Read
Use these AI prompts to improve your LinkedIn profile (and get noticed faster)
Computing

Use these AI prompts to improve your LinkedIn profile (and get noticed faster)

15 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?