A group of four malicious packages has emerged in the npm package registry, posing significant risks to Ethereum developers by targeting cryptocurrency wallet credentials. These packages, which disguise themselves as credible cryptographic tools and infrastructure associated with Flashbots, have demonstrated capabilities to exfiltrate valuable private keys and mnemonic seeds to a Telegram bot managed by the attacker.
According to analysis by Socket researcher Kush Pandya, the packages were published by a user identified as “flashbotts.” The first of these libraries was uploaded as early as September 2023, with the most recent addition made on August 19, 2025. The malicious packages remain available for download at the time of this report, raising concerns about their potential impact.
The impersonation of Flashbots is particularly concerning, as the organization plays a critical role in mitigating adverse effects of Maximal Extractable Value (MEV) on the Ethereum network. MEV exploits include various attacks like sandwiching, liquidations, backrunning, front-running, and time-bandit schemes. The library identified as “@flashbotts/ethers-provider-bundle” is deemed the most dangerous of the four. It falsely claims to offer full compatibility with the Flashbots API while secretly executing harmful operations. Notably, it can exfiltrate environment variables via SMTP using Mailtrap and redirect unsigned transactions to a wallet controlled by the attacker, while also logging metadata from pre-signed transactions.
The package named sdk-ethers appears mostly benign, yet it contains two functions that can send mnemonic seed phrases to a Telegram bot, activated unknowingly by developers during their projects. The second package, flashbot-sdk-eth, is also engineered to facilitate the theft of private keys. Additionally, the package gram-utilz provides a modular system for exfiltrating arbitrary data directly to the threat actor’s Telegram chat.
Mnemonic seed phrases serve as critical access points for recovering cryptocurrency wallets, and their unauthorized acquisition can enable attackers to gain full control over victims’ accounts. The presence of Vietnamese language comments in the source code raises suspicions that the threat actor may be Vietnamese-speaking, suggesting a potential geographical link to the malicious activities.
The discoveries highlight a sophisticated effort by attackers to exploit the trust inherent to established platforms for executing software supply chain attacks. By obscuring malicious functionality amidst predominantly innocuous code, they can evade detection. Pandya emphasized the implications of this strategy, explaining that given the widespread confidence in Flashbots among validators, searchers, and DeFi developers, any seemingly legitimate software development kit (SDK) is likely to be quickly integrated by those operating trading bots or managing hot wallets. The compromise of a private key in such an environment poses immediate and irreversible risks of fund theft.
Ultimately, by leveraging developers’ trust in familiar package names and interspersing harmful code within legitimate utilities, these malicious offerings create a perilous landscape for routine Web3 development, transforming it into a conduit for data exfiltration to attacker-controlled systems.