Blog Layout

The Cybersecurity Lair™ • March 12, 2024

Latest News | Cryptocurrency Wallets Under Siege

The BIPClip Chronicles

In the thrilling saga of software supply chain attacks, seven mischievous Python packages were discovered on PyPI, setting out to snatch BIP39 mnemonic phrases used to recover cryptocurrency wallet private keys. Codenamed "BIPClip" by the detective-like minds at ReversingLabs, these packages were the talk of the town, collectively downloaded 7,451 times before getting the boot from PyPI.


This is what happened:


A group of cunning cyber miscreants devised seven seemingly harmless Python packages that, when used by unsuspecting developers, secretly aimed to steal the digital keys safeguarding cryptocurrency wallets, highlighting the importance of cautious code adoption in the wild world of software development.


Key Takeaways:


Package Extravaganza: BIPClip rolled out with seven packages, each with its own sneaky agenda, downloaded thousands of times by unsuspecting Python enthusiasts.


Mnemonic Masterminds: The packages were on a mission to pilfer BIP39 mnemonic phrases, the golden keys to cryptocurrency wallets.


Cunning Codenames: Among the notorious lineup were gems like jsBIP39-decrypt, erc20-scanner, and public-address-generator – not exactly your average Python picnic.


Subtle Sabotage: One package, mnemonic_to_address, played it cool, lacking overt malicious vibes but slyly relying on bip39-mnemonic-decrypt for its dark deeds.


Supply Chain Shenanigans: BIPClip has been at it since December 4, 2022, proving that cryptocurrency remains a prime playground for supply chain tricksters.


Undercover Ops: The malicious packages were crafted with precision, mimicking legitimate functions to dodge suspicion and avoid triggering security alarms.


Server Heist: The masterplan involved stealing mnemonic phrases and whisking them away to an actor-controlled server – a high-stakes heist in the world of crypto.


HashDecrypts Mystery: Hashdecrypts threw a curveball, hinting at a GitHub profile named "HashSnake" and a repository called hCrypto, showcasing a year-long campaign.


GitHub Gambit: Legitimate services like GitHub served as unwitting accomplices, facilitating the distribution of malware-laden packages.


Trojan Time Bombs: Abandoned projects became the new playground for threat actors, lurking like time bombs to hijack developer accounts and launch Trojan horse-style attacks.

Lessons Learned:


Vigilance is Vital: Stay alert, fellow Python enthusiasts – not all packages come bearing gifts; some have more sinister plans.

Cryptocurrency Caution: The world of crypto is a hotspot for mischief; ensure your supply chain armor is well-polished.

Code Concealment: Crafty criminals are adept at making malicious code blend in; scrutiny is your best defense.

Beware the Abandoned: Don't underestimate abandoned projects; they're ripe for exploitation and can unleash havoc on unsuspecting users.

GitHub's Double-Edged Sword: While GitHub is a haven for collaboration, it's also a fertile ground for distributing malware; tread cautiously.


In the wild realm of open-source repositories, danger lurks in the shadows. Keep your wits about you, and may your code be forever secure!


Source and further reading.


The Hacker News. (n.d.-b). Watch out: These PYPI Python packages can drain your crypto wallets. https://thehackernews.com/2024/03/watch-out-these-pypi-python-packages.html


Maayan, G. D. (2018, May 5). Blockchain & Digital Currencies - Security Boulevard. Security Boulevard. https://securityboulevard.com/blockchain-digital-currency-bitcoin/

Share by: