No Result
View All Result
  • Login
Friday, October 31, 2025
FeeOnlyNews.com
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
No Result
View All Result
FeeOnlyNews.com
No Result
View All Result
Home Cryptocurrency

Lessons From NPM Crypto Exploit Near-Miss

by FeeOnlyNews.com
2 months ago
in Cryptocurrency
Reading Time: 10 mins read
A A
0
Lessons From NPM Crypto Exploit Near-Miss
Share on FacebookShare on TwitterShare on LInkedIn


A failed attack on popular Node Package Manager (NPM)
libraries sent shockwaves through the crypto world on Monday.

Hackers targeted major packages to hijack
cryptocurrency transactions across multiple blockchains, but due to coding
errors, the breach caused minimal loss.

Still, experts warn that the incident highlights ongoing
risks for software wallets, exchanges, and any platform that automatically
updates code libraries.

NPM Attack Hits Popular Libraries

The attack reportedly started with a phishing email
sent from a fake NPM support domain, which allowed hackers to access developer accounts. Malicious updates were then pushed to libraries, including chalk, debug, and strip-ansi.

The injected code attempted to intercept wallet
addresses on chains like Bitcoin, Ethereum
Ethereum

Ethereum is an open source, blockchain-based distributed computing platform and operating system featuring smart contract functionality. Created in 2014, Ethereum now stands as the second largest cryptocurrency by market cap at the time of writing.As a decentralized cryptocurrency network and software platform, Ethereum represents the most prominent altcoin. Ethereum also enables the creation Distributed Applications, or dapps. Understanding EthereumEthereum boasts its own programming language,

Ethereum is an open source, blockchain-based distributed computing platform and operating system featuring smart contract functionality. Created in 2014, Ethereum now stands as the second largest cryptocurrency by market cap at the time of writing.As a decentralized cryptocurrency network and software platform, Ethereum represents the most prominent altcoin. Ethereum also enables the creation Distributed Applications, or dapps. Understanding EthereumEthereum boasts its own programming language,
Read this Term
, Solana, Tron, and Litecoin.

Charles Guillemet, Ledger’s CTO, commented on X: “The
attack fortunately failed, with almost no victims. It began with a phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term

email from a fake npm support domain that stole credentials and gave attackers
access to publish malicious package updates.”

Update on the NPM attack: The attack fortunately failed, with almost no victims.🔒

It began with a phishing email from a fake npm support domain that stole credentials and gave attackers access to publish malicious package updates. The injected code targeted web crypto activity,… https://t.co/Ud1SBSJ52v pic.twitter.com/lOik6k7Dkp

— Charles Guillemet (@P3b7_) September 9, 2025

According to Guillemet, the injected code targeted web
crypto activity, affecting Ethereum, Solana, and other blockchains, hijacking
transactions and replacing wallet addresses directly in network responses.

Read more: Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

“If your funds sit in a software wallet or on an
exchange, you’re one code execution away from losing everything. Supply-chain
compromises remain a powerful malware delivery vector, and we’re also seeing
more targeted attacks emerge,” he said.

Understanding the Threat

Anatoly Makosov, CTO of The Open Network (TON), also addressed the matter by explaining the mechanics of the attack on X and that only 18 specific package versions were compromised.

Makosov said developers who deployed builds shortly
after the malicious updates, or who rely on auto-updating libraries, were most
exposed. “Developers of multi-chain products should check their code,
especially if they have released something today,” he warned.

⚠️ Attack on popular NPM packages — technical details

A few hours ago, hackers gained access to some NPM accounts and published infected versions of popular libraries.

Many web products use these packages.

Although TON products do not appear to be at risk, developers of…

— Anatoly Makosov (@anatoly_makosov) September 8, 2025

Makosov emphasized that all earlier and newer versions
of the allegedly attacked packages are considered safe. Fixes have been
published, and developers are urged to reinstall clean code and rebuild their
applications.

Minimal Impact, Major Lesson

Despite the sophisticated attempt, the financial
impact was limited. Guillemet credited early detection to errors in the
attackers’ code that caused CI/CD pipeline crashes.

“Hardware wallets are built to withstand these
threats,” Guillemet said. Ledger devices include Clear Signing, letting users
verify transactions on a secure screen, and Transaction Check, which warns of
suspicious activity. “Your private keys and recovery phrase remain safe.
The immediate danger may have passed, but the threat hasn’t. Stay safe,” he
added.

Makosov and Guillemet both emphasized that vigilance
is crucial. Developers should lock dependencies to safe versions and avoid
dynamic updates, while users should avoid blind signing and always verify
wallet addresses.

Meanwhile, crypto wallet provider Ledger has assured
its users that its systems remain safe.

Ledger devices are not and have not been at risk during an ecosystem-wide software supply chain attack that was discovered.

Ledger devices are built specifically to protect users against attacks like these.

Only Ledger devices have secure screens, powered by the Secure Element… https://t.co/cJO2w0dpmU

— Ledger (@Ledger) September 8, 2025

“Ledger devices are not and have not been at risk
during an ecosystem-wide software supply chain attack that was discovered.
Ledger devices are built specifically to protect users against attacks like
these,” the company mentioned.

“Ledger devices are not and have not been at risk
during an ecosystem-wide software supply chain attack that was discovered.
Ledger devices are built specifically to protect users against attacks like
these.”

Developers have now been urged to examine their
projects’ package files for affected versions and update or rebuild with secure
releases. Users, meanwhile, should avoid blind signing and always verify wallet
addresses before confirming transactions.

A failed attack on popular Node Package Manager (NPM)
libraries sent shockwaves through the crypto world on Monday.

Hackers targeted major packages to hijack
cryptocurrency transactions across multiple blockchains, but due to coding
errors, the breach caused minimal loss.

Still, experts warn that the incident highlights ongoing
risks for software wallets, exchanges, and any platform that automatically
updates code libraries.

NPM Attack Hits Popular Libraries

The attack reportedly started with a phishing email
sent from a fake NPM support domain, which allowed hackers to access developer accounts. Malicious updates were then pushed to libraries, including chalk, debug, and strip-ansi.

The injected code attempted to intercept wallet
addresses on chains like Bitcoin, Ethereum
Ethereum

Ethereum is an open source, blockchain-based distributed computing platform and operating system featuring smart contract functionality. Created in 2014, Ethereum now stands as the second largest cryptocurrency by market cap at the time of writing.As a decentralized cryptocurrency network and software platform, Ethereum represents the most prominent altcoin. Ethereum also enables the creation Distributed Applications, or dapps. Understanding EthereumEthereum boasts its own programming language,

Ethereum is an open source, blockchain-based distributed computing platform and operating system featuring smart contract functionality. Created in 2014, Ethereum now stands as the second largest cryptocurrency by market cap at the time of writing.As a decentralized cryptocurrency network and software platform, Ethereum represents the most prominent altcoin. Ethereum also enables the creation Distributed Applications, or dapps. Understanding EthereumEthereum boasts its own programming language,
Read this Term
, Solana, Tron, and Litecoin.

Charles Guillemet, Ledger’s CTO, commented on X: “The
attack fortunately failed, with almost no victims. It began with a phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term

email from a fake npm support domain that stole credentials and gave attackers
access to publish malicious package updates.”

Update on the NPM attack: The attack fortunately failed, with almost no victims.🔒

It began with a phishing email from a fake npm support domain that stole credentials and gave attackers access to publish malicious package updates. The injected code targeted web crypto activity,… https://t.co/Ud1SBSJ52v pic.twitter.com/lOik6k7Dkp

— Charles Guillemet (@P3b7_) September 9, 2025

According to Guillemet, the injected code targeted web
crypto activity, affecting Ethereum, Solana, and other blockchains, hijacking
transactions and replacing wallet addresses directly in network responses.

Read more: Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

“If your funds sit in a software wallet or on an
exchange, you’re one code execution away from losing everything. Supply-chain
compromises remain a powerful malware delivery vector, and we’re also seeing
more targeted attacks emerge,” he said.

Understanding the Threat

Anatoly Makosov, CTO of The Open Network (TON), also addressed the matter by explaining the mechanics of the attack on X and that only 18 specific package versions were compromised.

Makosov said developers who deployed builds shortly
after the malicious updates, or who rely on auto-updating libraries, were most
exposed. “Developers of multi-chain products should check their code,
especially if they have released something today,” he warned.

⚠️ Attack on popular NPM packages — technical details

A few hours ago, hackers gained access to some NPM accounts and published infected versions of popular libraries.

Many web products use these packages.

Although TON products do not appear to be at risk, developers of…

— Anatoly Makosov (@anatoly_makosov) September 8, 2025

Makosov emphasized that all earlier and newer versions
of the allegedly attacked packages are considered safe. Fixes have been
published, and developers are urged to reinstall clean code and rebuild their
applications.

Minimal Impact, Major Lesson

Despite the sophisticated attempt, the financial
impact was limited. Guillemet credited early detection to errors in the
attackers’ code that caused CI/CD pipeline crashes.

“Hardware wallets are built to withstand these
threats,” Guillemet said. Ledger devices include Clear Signing, letting users
verify transactions on a secure screen, and Transaction Check, which warns of
suspicious activity. “Your private keys and recovery phrase remain safe.
The immediate danger may have passed, but the threat hasn’t. Stay safe,” he
added.

Makosov and Guillemet both emphasized that vigilance
is crucial. Developers should lock dependencies to safe versions and avoid
dynamic updates, while users should avoid blind signing and always verify
wallet addresses.

Meanwhile, crypto wallet provider Ledger has assured
its users that its systems remain safe.

Ledger devices are not and have not been at risk during an ecosystem-wide software supply chain attack that was discovered.

Ledger devices are built specifically to protect users against attacks like these.

Only Ledger devices have secure screens, powered by the Secure Element… https://t.co/cJO2w0dpmU

— Ledger (@Ledger) September 8, 2025

“Ledger devices are not and have not been at risk
during an ecosystem-wide software supply chain attack that was discovered.
Ledger devices are built specifically to protect users against attacks like
these,” the company mentioned.

“Ledger devices are not and have not been at risk
during an ecosystem-wide software supply chain attack that was discovered.
Ledger devices are built specifically to protect users against attacks like
these.”

Developers have now been urged to examine their
projects’ package files for affected versions and update or rebuild with secure
releases. Users, meanwhile, should avoid blind signing and always verify wallet
addresses before confirming transactions.





Source link

Tags: CryptoexploitLessonsnearmissNPM
ShareTweetShare
Previous Post

Amsterdam’s Nebius shares soar 51% after sealing €16.5B AI infrastructure deal with Microsoft

Next Post

Cassidy Raises $10M to Scale Context-Powered AI Automation for Non-Technical Teams – AlleyWatch

Related Posts

Coinbase Ends Q3 by Beating Street Estimates by 45%, Revenue Hits .86B

Coinbase Ends Q3 by Beating Street Estimates by 45%, Revenue Hits $1.86B

by FeeOnlyNews.com
October 31, 2025
0

Coinbase (Nasdaq: COIN) ended the third quarter of 2025 with $1.50 in earnings per share, beating Wall Street’s expectation of...

Decentralized Crypto Exchange Plans Year-End Debut, Reuters

Decentralized Crypto Exchange Plans Year-End Debut, Reuters

by FeeOnlyNews.com
October 31, 2025
0

dYdX (DYDX), one of the leading decentralized cryptocurrency trading platforms in the industry, is reportedly preparing to enter the US...

Binance Supercharges Crypto Adoption in Argentina With a QR Code Bridge to the Peso

Binance Supercharges Crypto Adoption in Argentina With a QR Code Bridge to the Peso

by FeeOnlyNews.com
October 31, 2025
0

Binance is supercharging crypto’s real-world momentum with a groundbreaking push into Argentina’s digital payments scene, launching instant, fee-free QR crypto...

Strategy Q3 Income Narrows to .8B as mNAV Shrinks

Strategy Q3 Income Narrows to $2.8B as mNAV Shrinks

by FeeOnlyNews.com
October 30, 2025
0

Shares in Strategy have risen nearly 6% after hours as the Bitcoin treasury company reported a net income of $2.8...

Canary Funds updates S-1 filing for XRP spot ETF, targeting November 13 launch

Canary Funds updates S-1 filing for XRP spot ETF, targeting November 13 launch

by FeeOnlyNews.com
October 30, 2025
0

Key Takeaways Canary Funds updated its S-1 for an XRP spot ETF, removing the delaying amendment. The ETF could launch...

Ripple Depends On XRP Price, Not Market Utility: Experts

Ripple Depends On XRP Price, Not Market Utility: Experts

by FeeOnlyNews.com
October 30, 2025
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure The long-running dispute over what XRP is...

Next Post
Cassidy Raises M to Scale Context-Powered AI Automation for Non-Technical Teams – AlleyWatch

Cassidy Raises $10M to Scale Context-Powered AI Automation for Non-Technical Teams – AlleyWatch

Mortgage Rates Today, Tuesday, September 9: Noticeably Lower

Mortgage Rates Today, Tuesday, September 9: Noticeably Lower

  • Trending
  • Comments
  • Latest
AB Infrabuild, among 5 cos to approach record date for stock splits. Last day to buy for eligibility

AB Infrabuild, among 5 cos to approach record date for stock splits. Last day to buy for eligibility

October 15, 2025
Housing Market Loses Steam, “National Buyer’s Market” Likely in 2026

Housing Market Loses Steam, “National Buyer’s Market” Likely in 2026

October 14, 2025
Are You Losing Out Because of Medicare Open Enrollment Mistakes?

Are You Losing Out Because of Medicare Open Enrollment Mistakes?

October 13, 2025
Coinbase boosts investment in India’s CoinDCX, valuing exchange at .45B

Coinbase boosts investment in India’s CoinDCX, valuing exchange at $2.45B

October 15, 2025
Government shutdown could drain financial advisor optimism

Government shutdown could drain financial advisor optimism

October 7, 2025
Getting Started: How to Register

Getting Started: How to Register

October 10, 2025
Vedanta Q2 Results: Cons profit plunges 59% YoY to Rs 1,798 crore on exceptional loss of Rs 2,067 crore

Vedanta Q2 Results: Cons profit plunges 59% YoY to Rs 1,798 crore on exceptional loss of Rs 2,067 crore

0
Cambridge’s PACT raises €17.2M to scale its collagen-based alternative to plastic textiles

Cambridge’s PACT raises €17.2M to scale its collagen-based alternative to plastic textiles

0
5 Undervalued Stocks Under  Poised for Double-Digit Rebounds

5 Undervalued Stocks Under $10 Poised for Double-Digit Rebounds

0
Ameriprise Q3 earnings rise despite RIA losses

Ameriprise Q3 earnings rise despite RIA losses

0
China’s Pony.ai gets the first permit for robotaxis in all of Shenzhen

China’s Pony.ai gets the first permit for robotaxis in all of Shenzhen

0
Retire at 50 with Just .5M? The Brutal Truth + 4 Dead-Simple Things to Make It Happen Before You’re 60

Retire at 50 with Just $2.5M? The Brutal Truth + 4 Dead-Simple Things to Make It Happen Before You’re 60

0
5 Undervalued Stocks Under  Poised for Double-Digit Rebounds

5 Undervalued Stocks Under $10 Poised for Double-Digit Rebounds

October 31, 2025
Cambridge’s PACT raises €17.2M to scale its collagen-based alternative to plastic textiles

Cambridge’s PACT raises €17.2M to scale its collagen-based alternative to plastic textiles

October 31, 2025
Companies are trying to do too much with AI, says IT CEO

Companies are trying to do too much with AI, says IT CEO

October 31, 2025
China’s Pony.ai gets the first permit for robotaxis in all of Shenzhen

China’s Pony.ai gets the first permit for robotaxis in all of Shenzhen

October 31, 2025
Medpace Holdings – MEDP: Kapitalrendite besser als bei Iqvia, Thermo Fisher & Icon!

Medpace Holdings – MEDP: Kapitalrendite besser als bei Iqvia, Thermo Fisher & Icon!

October 31, 2025
Vedanta Q2 Results: Cons profit plunges 59% YoY to Rs 1,798 crore on exceptional loss of Rs 2,067 crore

Vedanta Q2 Results: Cons profit plunges 59% YoY to Rs 1,798 crore on exceptional loss of Rs 2,067 crore

October 31, 2025
FeeOnlyNews.com

Get the latest news and follow the coverage of Business & Financial News, Stock Market Updates, Analysis, and more from the trusted sources.

CATEGORIES

  • Business
  • Cryptocurrency
  • Economy
  • Financial Planning
  • Investing
  • Market Analysis
  • Markets
  • Money
  • Personal Finance
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • 5 Undervalued Stocks Under $10 Poised for Double-Digit Rebounds
  • Cambridge’s PACT raises €17.2M to scale its collagen-based alternative to plastic textiles
  • Companies are trying to do too much with AI, says IT CEO
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclaimers
  • About Us
  • Contact Us

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.