No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Thursday, January 22, 2026
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Cryptocurrency

Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

by TheAdviserMagazine
5 months ago
in Cryptocurrency
Reading Time: 7 mins read
A A
Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads
Share on FacebookShare on TwitterShare on LInkedIn


A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.

A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.



Source link

Tags: AccountsaffectingattackCryptoDownloadsexploitHackersJavaScriptMassivereportedly
ShareTweetShare
Previous Post

Trump U.S. Open invitation from Rolex comes after slapping tariff on Switzerland

Next Post

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Related Posts

edit post
Bitcoin Consolidates Near K Amid Volatility as Cooling PCE Inflation Fuels Risk‑On Sentiment

Bitcoin Consolidates Near $90K Amid Volatility as Cooling PCE Inflation Fuels Risk‑On Sentiment

by TheAdviserMagazine
January 22, 2026
0

Global markets rallied after U.S. President Donald Trump de-escalated trade tensions with Europe and Greenland, sparking a relief surge across...

edit post
Valeo and Natix Build Open AI Model for Autonomous Vehicles

Valeo and Natix Build Open AI Model for Autonomous Vehicles

by TheAdviserMagazine
January 22, 2026
0

Automotive technology supplier Valeo and Natix Network, a Solana-based decentralized physical infrastructure network (DePIN) provider, have partnered to build an...

edit post
Nomura’s crypto arm debuts tokenized Bitcoin fund targeting excess returns

Nomura’s crypto arm debuts tokenized Bitcoin fund targeting excess returns

by TheAdviserMagazine
January 22, 2026
0

Laser Digital Asset Management, the digital asset arm of Nomura, Japan’s largest investment bank, announced today the launch of Bitcoin...

edit post
What Ripple CEO Garlinghouse Said At WEF Davos 2026

What Ripple CEO Garlinghouse Said At WEF Davos 2026

by TheAdviserMagazine
January 22, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure Ripple CEO Brad Garlinghouse used a Davos...

edit post
Senate Ag Releases Crypto Market Bill Draft Amid Democrats Backlash, Here’s What to Know

Senate Ag Releases Crypto Market Bill Draft Amid Democrats Backlash, Here’s What to Know

by TheAdviserMagazine
January 22, 2026
0

xThe Senate Agriculture Committee has shared its updated crypto market bill ahead of its January 27 markup. The new draft...

edit post
XRP Price Dips 3% as Garlinghouse Supports CLARITY Act

XRP Price Dips 3% as Garlinghouse Supports CLARITY Act

by TheAdviserMagazine
January 21, 2026
0

Join Our Telegram channel to stay up to date on breaking news coverage The XRP price has dipped 3% in...

Next Post
edit post
Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

edit post
The Five Habits of Highly Effective Real Estate Investors

The Five Habits of Highly Effective Real Estate Investors

  • Trending
  • Comments
  • Latest
edit post
Most People Buy Mansions But This Virginia Lottery Winner Took the Lump Sum From a 8 Million Jackpot and Bought a Zero-Turn Lawn Mower Instead

Most People Buy Mansions But This Virginia Lottery Winner Took the Lump Sum From a $348 Million Jackpot and Bought a Zero-Turn Lawn Mower Instead

January 10, 2026
edit post
Utility Shutoff Policies Are Changing in Several Midwestern States

Utility Shutoff Policies Are Changing in Several Midwestern States

January 9, 2026
edit post
80-year-old Home Depot rival shuts down location, no bankruptcy

80-year-old Home Depot rival shuts down location, no bankruptcy

January 4, 2026
edit post
Tennessee theater professor reinstated, with 0,000 settlement, after losing his job over a Charlie Kirk-related social media post

Tennessee theater professor reinstated, with $500,000 settlement, after losing his job over a Charlie Kirk-related social media post

January 8, 2026
edit post
Warren Buffett retires on December 31 and leaves behind a manual for a life in investing

Warren Buffett retires on December 31 and leaves behind a manual for a life in investing

December 27, 2025
edit post
Elon Musk Left DOGE… But He Hasn’t Left Washington

Elon Musk Left DOGE… But He Hasn’t Left Washington

January 2, 2026
edit post
Exporters’ budget wishlist: tax sops, inverted duty structure correction, and more

Exporters’ budget wishlist: tax sops, inverted duty structure correction, and more

0
edit post
Marginal Returns of Regulation – Econlib

Marginal Returns of Regulation – Econlib

0
edit post
Bitcoin Consolidates Near K Amid Volatility as Cooling PCE Inflation Fuels Risk‑On Sentiment

Bitcoin Consolidates Near $90K Amid Volatility as Cooling PCE Inflation Fuels Risk‑On Sentiment

0
edit post
5 Preventive Services Losing Preferred Status

5 Preventive Services Losing Preferred Status

0
edit post
Travel Trends Are Shifting—Here’s How It’s Impacting the Short-Term Rental Market

Travel Trends Are Shifting—Here’s How It’s Impacting the Short-Term Rental Market

0
edit post
Empower Review: Is Empower Retirement Legitimate?

Empower Review: Is Empower Retirement Legitimate?

0
edit post
5 Preventive Services Losing Preferred Status

5 Preventive Services Losing Preferred Status

January 22, 2026
edit post
Bitcoin Consolidates Near K Amid Volatility as Cooling PCE Inflation Fuels Risk‑On Sentiment

Bitcoin Consolidates Near $90K Amid Volatility as Cooling PCE Inflation Fuels Risk‑On Sentiment

January 22, 2026
edit post
Procter & Gamble maintains 2%–4% organic sales growth outlook as U.S. interventions ramp up (NYSE:PG)

Procter & Gamble maintains 2%–4% organic sales growth outlook as U.S. interventions ramp up (NYSE:PG)

January 22, 2026
edit post
Empower Review: Is Empower Retirement Legitimate?

Empower Review: Is Empower Retirement Legitimate?

January 22, 2026
edit post
AI makes human intelligence more important, not less 

AI makes human intelligence more important, not less 

January 22, 2026
edit post
PayPal buying Israeli startup Cymbio

PayPal buying Israeli startup Cymbio

January 22, 2026
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • 5 Preventive Services Losing Preferred Status
  • Bitcoin Consolidates Near $90K Amid Volatility as Cooling PCE Inflation Fuels Risk‑On Sentiment
  • Procter & Gamble maintains 2%–4% organic sales growth outlook as U.S. interventions ramp up (NYSE:PG)
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.