Web3 Security Stack Highlights Threat from Malicious NPM Package

TheNewsCryptoPubblicato 2026-03-10Pubblicato ultima volta 2026-03-10

Introduzione

Web3 Antivirus has identified a malicious NPM package disguised as an OpenClaw installer that deploys a Remote Access Trojan (RAT) targeting macOS users. The package, once installed, launches a fake CLI installer and prompts for the Keychain password. If provided, it steals sensitive data including seed phrases, browser credentials, wallet information, and SSH keys, sending them to the attacker’s server. Previously, Web3 Antivirus warned about legitimate Chrome extensions—QuickLens and ShotBird—that turned malicious after ownership transfers. These were used to inject malicious scripts and steal user data, including exchange session details and wallet credentials. Looking ahead to 2026, key Web3 security threats include smart contract exploits (due to logic errors and access control issues), phishing, social engineering, wallet drainers, and oracle manipulation. The primary goals of these attacks are data theft and fund draining.

Web3 Antivirus, or Web3 security stack, has highlighted a threat from a malicious NPM package. It earlier flagged a threat from a legitimate Chrome extension. Notably, smart contract exploits and phishing & social engineering are some of the top Web3 security threats to lookout for in 2026.

Web3 Security Issue Flagged

Web3 Antivirus has published a post on X to inform the community that a malicious NPM package was caught deploying a RAT. It was disguised as an OpenClaw installer with the primary objective of stealing macOS credentials. Web3 Antivirus has further briefed the community about how the act was being carried out.

The package launches a fake CLI installer after it is installed normally. Once launched, it seeks macOS Keychain password. It is recommended not to do so because once shared, the malware can extract several pieces of information. This includes seed phrases, browser credentials, crypto wallet data, and SSH & cloud keys.

All the pieces find their way to the attacker’s server. Web3, with this, is seeing different types of threats for users worldwide.

Previously Flagged Threat

Web3 Antivirus previously flagged a threat from a legitimate Chrome extension. It warned that it was turning malicious after the ownership was transferred. This allows attackers to inject codes into web pages and steal the data of a user. The update, according to Web3 security stack, removed security headers and fingerprints before pulling malicious scripts from a remote server.

For the crypto community, such an act can turn into a theft for exchange sessions, compromised wallets, browser credentials, and seed phrase phishing.

It has named two extensions: QuickLens and ShotBird, adding that they have 7,000 and 800 users, respectively.

Top Web3 Security Threats in 2026

Some of the top Web3 security threats in 2026 are smart contract exploits and phishing & social engineering. The former largely pertains to vulnerabilities in code. This refers to infusing logic errors, input validation issues, and access control failures.

The latter, as the name suggests, involves making fake calls or impersonating partners to attack users and developers – even founders on some occasions.

Others on the list are wallet drainers, private key manipulation, and price oracle manipulation. The end goal of malicious actors is to steal data and drain funds or negatively impact the system.

Some of the common vulnerabilities are access control failures, logic errors, and unsigned API queries.

Highlighted Crypto News Today:

Nasdaq Collaboration Targets Pan-European Tokenized Securities Trading and Settlement

TagsWeb3

Domande pertinenti

QWhat type of malicious software was the NPM package caught deploying, and what was its primary objective?

AThe malicious NPM package was caught deploying a RAT (Remote Access Trojan). Its primary objective was to steal macOS credentials.

QWhat specific user information can the malware extract after obtaining the macOS Keychain password?

AThe malware can extract seed phrases, browser credentials, crypto wallet data, and SSH & cloud keys.

QWhat previously flagged threat did Web3 Antivirus warn about involving a legitimate Chrome extension?

AWeb3 Antivirus warned about a legitimate Chrome extension that turned malicious after ownership was transferred, allowing attackers to inject code into web pages and steal user data.

QWhat are two of the top Web3 security threats highlighted for 2026?

ATwo of the top Web3 security threats for 2026 are smart contract exploits and phishing & social engineering.

QWhat are the names of the two malicious Chrome extensions mentioned, and how many users do they have respectively?

AThe two malicious Chrome extensions are named QuickLens and ShotBird, with 7,000 and 800 users respectively.

Letture associate

AI "Transfer Station" Earning Millions Monthly? Five Questions Uncover the Truth of Token Arbitrage

The article "AI 'Transfer Station' Earns Millions Monthly? Five Questions Uncover the Truth of Token Arbitrage" explores the emerging business of API token transfer stations, which profit from global AI service price disparities and access barriers. These intermediaries purchase low-cost tokens from overseas AI providers (e.g., OpenAI, Claude) through grey-market methods—such as exploiting enterprise credits, bulk accounts, or subscription benefits—and resell them to Chinese users at a markup. Key drivers include the high cost of using top AI models (e.g., Claude Code costs ~$5 per million tokens), the performance gap between domestic and foreign models, and mismatches between subscription and API pricing. However, the practice carries significant risks: upstream token sources may be unstable or illegal; user data passing through intermediaries can be harvested or injected with hidden prompts; and models might be downgraded without disclosure. The market is evolving, with some operators now exporting cheaper Chinese models (e.g., Qwen3.5 at ~$0.11 per million tokens) to overseas users, leveraging price gaps. Yet, sustainability is low due to compliance crackdowns, instability, and reputational risks. Users are advised to employ detection methods (e.g., prompt adherence tests) and avoid sensitive data usage. The authors caution that while transfer stations offer short-term arbitrage, they lack long-term reliability and security compared to official APIs.

marsbit35 min fa

AI "Transfer Station" Earning Millions Monthly? Five Questions Uncover the Truth of Token Arbitrage

marsbit35 min fa

The Cost of an 11.5% Annualized Return: Will MicroStrategy's STRC Face a Moment of Reckoning?

This article analyzes the potential risks associated with MicroStrategy's (MSTR) use of structured financial products like STRC to leverage its BTC exposure. While these tools have enabled impressive returns (e.g., 11.5% annualized) and fueled significant capital inflows ($13.5B outstanding), they also create substantial annual dividend obligations (~$400M). The author argues that this structure, while effective in a bull market, could become a liability if BTC price stagnates or declines. The core risk is a potential negative feedback loop: the growing dividend burden from continued STRC issuance may eventually outweigh the benefits of increased BTC holdings. To meet these obligations, MicroStrategy might need to use new issuance proceeds for dividends instead of buying more BTC, which could disappoint equity investors. If the market capitalization (mNAV) falls below the value of its BTC holdings, the company could be forced to sell BTC instead of issuing new shares, potentially triggering a panic. The author estimates a potential inflection point in 6 months, where annual dividend costs reach $3-4B. At that stage, CEO Michael Saylor might face a difficult choice: sell BTC to meet obligations or sacrifice the credibility of the preferred shares by halting dividends. The article concludes that this financial engineering, while powerful, could ultimately "backfire" on MicroStrategy if market conditions turn.

marsbit1 h fa

The Cost of an 11.5% Annualized Return: Will MicroStrategy's STRC Face a Moment of Reckoning?

marsbit1 h fa

Trading

Spot
Futures
活动图片