{"id":46397,"date":"2025-09-08T19:01:43","date_gmt":"2025-09-08T19:01:43","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=46397"},"modified":"2025-09-08T19:01:43","modified_gmt":"2025-09-08T19:01:43","slug":"largest-supply-chain-attack-in-history-targets-crypto-users-through-compromised-javascript-packages","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=46397","title":{"rendered":"Largest supply chain attack in history targets crypto users through compromised JavaScript packages"},"content":{"rendered":"<div>\n<p>A new cyberattack is silently targeting crypto from users during transactions amid an incident that security researchers describe as the largest supply chain attack in history.<\/p>\n<p>BleepingComputer reported that hackers compromised NPM package maintainer accounts through phishing emails and injected malware that steals crypto.<\/p>\n<p>The attack targeted JavaScript developers with fraudulent emails appearing to originate from \u201csupport@npmjs.help,\u201d an impersonated domain mimicking the legitimate NPM registry.<\/p>\n<p>The phishing messages warned maintainers that their accounts would be locked on Sept. 10, unless they updated their two-factor authentication credentials through a malicious link.<\/p>\n<p>Attackers successfully compromised 18 widely-used JavaScript packages with collective weekly downloads exceeding 2.6 billion.<\/p>\n<p>The compromised libraries include fundamental development tools such as \u201cchalk\u201d (300 million weekly downloads), \u201cdebug\u201d (358 million), and \u201cansi-styles\u201d (371 million), affecting virtually the entire JavaScript ecosystem.<\/p>\n<h2>Targeting crypto<\/h2>\n<p>The malicious code operates as a browser-based interceptor, monitoring network traffic for crypto transactions across <a href=\"https:\/\/cryptoslate.com\/coins\/ethereum\/\">Ethereum<\/a>, <a href=\"https:\/\/cryptoslate.com\/coins\/bitcoin\/\">Bitcoin<\/a>, <a href=\"https:\/\/cryptoslate.com\/coins\/solana\/\">Solana<\/a>, <a href=\"https:\/\/cryptoslate.com\/coins\/tron\/\">Tron<\/a>, <a href=\"https:\/\/cryptoslate.com\/coins\/litecoin\/\">Litecoin<\/a>, and <a href=\"https:\/\/cryptoslate.com\/coins\/bitcoin-cash\/\">Bitcoin Cash<\/a> networks.<\/p>\n<p>When users initiate crypto transfers, the malware silently replaces destination wallet addresses with attacker-controlled accounts before transaction signing.<\/p>\n<p>Aikido Security researcher Charlie Eriksen explained:<\/p>\n<blockquote>\n<p>\u201cWhat makes it dangerous is that it operates at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users\u2019 apps believe they are signing.\u201d<\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/cryptoslate.com\/companies\/ledger\/\">Ledger<\/a> CTO <a href=\"https:\/\/cryptoslate.com\/people\/charles-guillemet\/\">Charles Guillemet<\/a> warned crypto users about the <a href=\"https:\/\/cryptoslate.com\/dark-web-vendors-distribute-fake-ledger-wallet-pages-targeting-crypto-users\/\">ongoing threat<\/a>, <a href=\"https:\/\/x.com\/P3b7_\/status\/1965094840959410230\">noting the JavaScript ecosystem may be compromised<\/a> given the massive download figures.<\/p>\n<p>Hardware wallet users retain protection if they verify transaction details before signing, while software wallet users face a higher risk. Guillemet advised:<\/p>\n<blockquote>\n<p>\u201cIf you don\u2019t use a hardware wallet, refrain from making any on-chain transactions for now.\u201d<\/p>\n<\/blockquote>\n<p>He also noted uncertainty about whether attackers can directly extract seed phrases from software wallets.<\/p>\n<h2>Sophisticated targeting<\/h2>\n<p>The attack represents a sophisticated supply chain targeting where criminals compromise trusted development infrastructure to reach end users.<\/p>\n<p>By infiltrating packages downloaded billions of times weekly, attackers gained unprecedented access to cryptocurrency applications and wallet interfaces.<\/p>\n<p>BleepingComputer identified the phishing infrastructure exfiltrating credentials to \u201cwebsocket-api2.publicvm.com,\u201d demonstrating the coordinated nature of the operation.<\/p>\n<p>This incident follows similar JavaScript library compromises throughout 2025, including the July attack on \u201ceslint-config-prettier,\u201d which had 30 million weekly downloads, and March compromises affecting ten popular NPM libraries.<\/p>\n<p>The post <a href=\"https:\/\/cryptoslate.com\/largest-supply-chain-attack-in-history-targets-crypto-users-through-compromised-javascript-packages\/\">Largest supply chain attack in history targets crypto users through compromised JavaScript packages<\/a> appeared first on <a href=\"https:\/\/cryptoslate.com\/\">CryptoSlate<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new cyberattack is silently targeting crypto from users during transactions amid an incident that security researchers describe as the largest supply chain attack in history. BleepingComputer reported that hackers compromised NPM package maintainer accounts through phishing emails and injected malware that steals crypto. The attack targeted JavaScript developers with fraudulent emails appearing to originate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-46397","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/46397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=46397"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/46397\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=46397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=46397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=46397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}