🎉 Gate Square Growth Points Summer Lucky Draw Round 1️⃣ 2️⃣ Is Live!
🎁 Prize pool over $10,000! Win Huawei Mate Tri-fold Phone, F1 Red Bull Racing Car Model, exclusive Gate merch, popular tokens & more!
Try your luck now 👉 https://www.gate.com/activities/pointprize?now_period=12
How to earn Growth Points fast?
1️⃣ Go to [Square], tap the icon next to your avatar to enter [Community Center]
2️⃣ Complete daily tasks like posting, commenting, liking, and chatting to earn points
100% chance to win — prizes guaranteed! Come and draw now!
Event ends: August 9, 16:00 UTC
More details: https://www
AI-Crafted Crypto Wallet Drainer Bypasses Security Tools, Empties Balances Fast
An AI-generated crypto malware disguised as a routine package drained wallets in seconds, exploiting open-source ecosystems and sparking urgent concerns across the blockchain and developer communities.
Inside the Crypto Wallet Drainer: How One Script Moved Funds in Seconds
Crypto investors were put on alert after cybersecurity firm Safety revealed on July 31 that a malicious JavaScript package designed with artificial intelligence (AI) had been used to steal funds from crypto wallets. Disguised as a benign utility called @kodane/patch-manager on the Node Package Manager (NPM) registry, the package contained embedded scripts engineered to drain wallet balances. Paul McCarty, head of research at Safety, explained:
The package executed scripts post-installation, deploying renamed files—monitor.js, sweeper.js, and utils.js—into hidden directories across Linux, Windows, and macOS systems. A background script, connection-pool.js, maintained an active connection to a command-and-control (C2) server, scanning infected devices for wallet files. Once detected, transaction-cache.js initiated the actual theft: “When a crypto wallet file is found, this file actually does the ‘sweeping’ which is the draining of funds from the wallet. It does this by identifying what’s in the wallet, then draining most of it.”
The stolen assets were routed through a hardcoded Remote Procedure Call (RPC) endpoint to a specific address on the Solana blockchain. McCarty added:
Published on July 28 and removed by July 30, the malware was downloaded over 1,500 times before NPM flagged it as malicious. Safety, based in Vancouver, is known for its prevention-first approach to software supply chain security. Its AI-driven systems analyze millions of open-source package updates, maintaining a proprietary database that detects four times more vulnerabilities than public sources. The firm’s tools are used by individual developers, Fortune 500 companies, and government agencies.