Crypto Users on Alert as Massive NPM Attack

9/9/2025
2min read
Denislav Manolov's Image
by Denislav Manolov
Crypto Expert at Airdrops.com
9/9/2025
2min read
Denislav Manolov's Image
by Denislav Manolov
Crypto Expert

Largest Supply Chain Attack in Open-Source History

The crypto community is facing one of the largest supply chain attacks ever recorded, after hackers compromised popular JavaScript libraries downloaded billions of times each week. According to multiple reports, attackers breached the Node Package Manager (NPM) account of a well-known developer, secretly injecting malware into trusted packages.

Charles Guillemet, CTO of Ledger, warned on Monday: “There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.”

The malware was designed to swap or hijack crypto wallet addresses, effectively diverting funds during transactions.

Core Libraries Under Attack

The breach specifically targeted chalk, strip-ansi, and color-convert, small but widely used utilities embedded in the dependency chains of countless apps. While many developers never install these libraries directly, they are buried deep in codebases across the web, making the risk extremely widespread.

The attack appears to have planted a crypto-clipper, a form of malware that silently alters wallet addresses during transactions. This means when a user attempts to send funds, the destination could be replaced with the hacker’s address.

Researchers stressed that while hardware wallet users remain largely safe, those relying on software wallets are highly vulnerable.

Users Urged to Halt Crypto Transactions

Amid rising concerns, security experts urged crypto users to pause online transactions until the threat is contained.

DeFiLlama founder Oxngmi explained on X: “The malicious code doesn’t automatically drain wallets — users still have to approve a bad transaction.”

He added that only projects updated after the compromised package was released are at risk, since many developers “pin” their dependencies to older, safer versions. However, users have no easy way to confirm which projects are affected, prompting broad warnings to avoid crypto interactions until packages are patched.

How Hackers Gained Access

The attackers reportedly used phishing emails disguised as official NPM support messages. Maintainers were told their accounts would be locked unless they updated their two-factor authentication by September 10.

The fake site captured credentials, granting attackers access to trusted developer accounts. From there, they pushed malicious updates into packages downloaded by millions each day.

Charlie Eriksen, researcher at Aikido Security, told: “The attack was especially dangerous because it operated at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users’ apps believe they are signing.”

A Wake-Up Call for Open-Source Security

The incident has been described as the biggest warning yet for open-source ecosystems, where community trust often replaces centralized oversight. Developers and end-users alike are being reminded that even the most popular code libraries are not immune to compromise.

With billions of downloads impacted, the attack represents a direct threat to the crypto economy, forcing users to reconsider how much they rely on unseen code dependencies. Until the compromised packages are fully cleaned, experts insist caution is the only safe course.

Share with your friends on social media:

Join the community and don't miss a crypto giveaway.

Subscribe for updates by e-mail with the latest research reviews, airdrop news, reward programs, event updates about upcoming airdrops.

By entering your email address you are accepting our Terms & Conditions and Privacy & Cookie Policy.