No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Friday, December 5, 2025
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Cryptocurrency

Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

by TheAdviserMagazine
3 months ago
in Cryptocurrency
Reading Time: 7 mins read
A A
Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads
Share on FacebookShare on TwitterShare on LInkedIn


A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.

A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.



Source link

Tags: AccountsaffectingattackCryptoDownloadsexploitHackersJavaScriptMassivereportedly
ShareTweetShare
Previous Post

Trump U.S. Open invitation from Rolex comes after slapping tariff on Switzerland

Next Post

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Related Posts

edit post
Bitcoin Price Faces Potential 60% Decline As Expert Warns Of ‘Major Bull Trap’

Bitcoin Price Faces Potential 60% Decline As Expert Warns Of ‘Major Bull Trap’

by TheAdviserMagazine
December 5, 2025
0

Despite the Bitcoin price recovery above the crucial $90,000 threshold—a level that has historically served as a supportive floor for...

edit post
Prediction Market Odds: House Democrat, Senate GOP Ahead of 2026 Elections

Prediction Market Odds: House Democrat, Senate GOP Ahead of 2026 Elections

by TheAdviserMagazine
December 5, 2025
0

According to the latest figures, President Donald Trump has logged 320 days of his second term, and his approval rating...

edit post
BTC Risk-Off Signal Remains High Below 0K

BTC Risk-Off Signal Remains High Below $100K

by TheAdviserMagazine
December 5, 2025
0

Bitcoin (BTC) may be holding above $90,000, but data implied that its price is still flashing a significant risk-off signal....

edit post
Zcash co-founder disagrees with Saylor on Bitcoin privacy

Zcash co-founder disagrees with Saylor on Bitcoin privacy

by TheAdviserMagazine
December 5, 2025
0

Key Takeaways Eli Ben-Sasson and Michael Saylor disagree on Bitcoin privacy. According to Saylor, Bitcoin shouldn’t have Zcash-style privacy because...

edit post
Could Strategy Be Forced To Sell Bitcoin? Bitwise CIO Says No

Could Strategy Be Forced To Sell Bitcoin? Bitwise CIO Says No

by TheAdviserMagazine
December 5, 2025
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure Bitwise Chief Investment Officer Matt Hougan is...

edit post
Seed Funding Vs Series A

Seed Funding Vs Series A

by TheAdviserMagazine
December 5, 2025
0

Raising money in crypto and Web3 is quite different from traditional startups. With token models, on-chain milestones, and unique business...

Next Post
edit post
Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

edit post
The Five Habits of Highly Effective Real Estate Investors

The Five Habits of Highly Effective Real Estate Investors

  • Trending
  • Comments
  • Latest
edit post
7 States That Are Quietly Taxing the Middle Class Into Extinction

7 States That Are Quietly Taxing the Middle Class Into Extinction

November 8, 2025
edit post
How to Make a Valid Will in North Carolina

How to Make a Valid Will in North Carolina

November 20, 2025
edit post
8 Places To Get A Free Turkey for Thanksgiving

8 Places To Get A Free Turkey for Thanksgiving

November 21, 2025
edit post
Could He Face Even More Charges Under California Law?

Could He Face Even More Charges Under California Law?

November 27, 2025
edit post
Data centers in Nvidia’s hometown stand empty awaiting power

Data centers in Nvidia’s hometown stand empty awaiting power

November 10, 2025
edit post
8 States Offering Special Cash Rebates for Residents Over 65

8 States Offering Special Cash Rebates for Residents Over 65

November 9, 2025
edit post
How Netflix won Hollywood’s biggest prize, Warner Bros Discovery

How Netflix won Hollywood’s biggest prize, Warner Bros Discovery

0
edit post
New Year Estate Planning Resolutions for 2025

New Year Estate Planning Resolutions for 2025

0
edit post
Market Talk – December 5, 2025

Market Talk – December 5, 2025

0
edit post
Bitcoin Price Faces Potential 60% Decline As Expert Warns Of ‘Major Bull Trap’

Bitcoin Price Faces Potential 60% Decline As Expert Warns Of ‘Major Bull Trap’

0
edit post
The MoneySense guide to inflation (2025)

The MoneySense guide to inflation (2025)

0
edit post
Now This Social Media Scam Is the ‘Top Threat for the General Public,’ Experts Say

Now This Social Media Scam Is the ‘Top Threat for the General Public,’ Experts Say

0
edit post
Bitcoin Price Faces Potential 60% Decline As Expert Warns Of ‘Major Bull Trap’

Bitcoin Price Faces Potential 60% Decline As Expert Warns Of ‘Major Bull Trap’

December 5, 2025
edit post
How Netflix won Hollywood’s biggest prize, Warner Bros Discovery

How Netflix won Hollywood’s biggest prize, Warner Bros Discovery

December 5, 2025
edit post
Market Talk – December 5, 2025

Market Talk – December 5, 2025

December 5, 2025
edit post
Prediction Market Odds: House Democrat, Senate GOP Ahead of 2026 Elections

Prediction Market Odds: House Democrat, Senate GOP Ahead of 2026 Elections

December 5, 2025
edit post
Three Ways To Get Actionable Buyer Feedback For Your Win/Loss Program

Three Ways To Get Actionable Buyer Feedback For Your Win/Loss Program

December 5, 2025
edit post
AI labs like Meta, Deepseek, and Xai earned worst grades possible on an existential safety index

AI labs like Meta, Deepseek, and Xai earned worst grades possible on an existential safety index

December 5, 2025
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Bitcoin Price Faces Potential 60% Decline As Expert Warns Of ‘Major Bull Trap’
  • How Netflix won Hollywood’s biggest prize, Warner Bros Discovery
  • Market Talk – December 5, 2025
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.