Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/19/51/79/19517980-623d-a101-fa44-1c726ad86c65/mza_12095998176625063391.jpeg/600x600bb.jpg
IT SPARC Cast
John Barger
109 episodes
1 day ago
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Tech News
Technology,
News,
News Commentary
RSS
All content for IT SPARC Cast is the property of John Barger and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Tech News
Technology,
News,
News Commentary
https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1757081958893-8dcda843-93bd-4d2e-8d36-7a77c8505505.jpeg
Crypto Wallets Compromised by Malicious npm Package
IT SPARC Cast
8 minutes 42 seconds
2 months ago
Crypto Wallets Compromised by Malicious npm Package

In this episode of IT SPARC Cast – CVE of the Week, John and Lou dive into a stealthy supply chain attack involving a malicious npm package impersonating NodeMailer. This package—nodejs-smtp—was designed to exploit unsuspecting developers by mimicking legitimate behavior while secretly stealing funds from popular cryptocurrency wallets like Atomic Wallet and Exodus on Windows systems.


The attack was cleverly disguised, executed through Electron-based payloads, and capable of repackaging the victim’s wallet apps to reroute crypto transactions to attacker-controlled wallets. Even build and CI pipelines could miss the infection due to the module’s deceptive functionality. With only 347 downloads before removal, the attack still presents a clear and present danger due to how easily it could be missed or reused.


John and Lou break down how this was discovered, how it works, why it’s dangerous, and what every developer and crypto user should do to protect themselves. They also reflect on how AI-assisted code review, registry controls, and isolated environments are now must-haves for any serious dev or security-conscious user.


⸻


🔗 Social Links (Wrap Up Section)


IT SPARC Cast

@ITSPARCCast on X

https://www.linkedin.com/company/sparc-sales/ on LinkedIn


John Barger

@john_Video on X

https://www.linkedin.com/in/johnbarger/ on LinkedIn


Lou Schmidt

@loudoggeek on X

https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn


Hosted on Acast. See acast.com/privacy for more information.

IT SPARC Cast
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.