Beware: Sneaky NPM Packages Target PayPal and Crypto Wallets—Guard Your Funds!
Hackers, masquerading as helpful developers, have been publishing malicious NPM packages to fool PayPal and cryptocurrency wallet users. They use PayPal-themed names to trick developers into installing them, only to harvest sensitive information. The moral of the story? Always read the fine print—especially when it’s disguised as a friendly package!

Hot Take:
Looks like cybercriminals have found a new gig moonlighting as package managers! Who knew npm could stand for ‘No PayPal Money’ and ‘Not My Precious’ wallet? Time to double-check those installations, because “npm i” might just mean “installing a new problem”.
Key Points:
- Threat actors are publishing malicious NPM packages targeting PayPal and cryptocurrency wallet users.
- The malicious packages include names such as oauth2-paypal, buttonfactoryserv-paypal, and pdf-to-office.
- A preinstall hook is used to execute malicious scripts and steal sensitive information.
- Compromised packages can hijack cryptocurrency transactions, sending funds to attackers’ wallets.
- Users must completely remove and reinstall compromised wallet applications to secure their funds.
Already a member? Log in here