No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Monday, October 27, 2025
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Cryptocurrency

Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

by TheAdviserMagazine
2 months ago
in Cryptocurrency
Reading Time: 7 mins read
A A
Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads
Share on FacebookShare on TwitterShare on LInkedIn


A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.

A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.



Source link

Tags: AccountsaffectingattackCryptoDownloadsexploitHackersJavaScriptMassivereportedly
ShareTweetShare
Previous Post

Trump U.S. Open invitation from Rolex comes after slapping tariff on Switzerland

Next Post

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Related Posts

edit post
Landmark ruling in India treats XRP as property, not speculation

Landmark ruling in India treats XRP as property, not speculation

by TheAdviserMagazine
October 27, 2025
0

A Madras High Court judge barred WazirX from reallocating a customer’s XRP holdings and declared cryptocurrency qualifies as property under...

edit post
Analyst slams S&P’s Strategy Bitcoin Treasury Rating

Analyst slams S&P’s Strategy Bitcoin Treasury Rating

by TheAdviserMagazine
October 27, 2025
0

Crypto market analyst Adam Livingston has sharply criticized S&P Global Ratings after the agency assigned a ‘B-’ issuer credit rating...

edit post
Shiba Inu Hides A 2,000% End-Cycle Breakout, Analyst Predicts

Shiba Inu Hides A 2,000% End-Cycle Breakout, Analyst Predicts

by TheAdviserMagazine
October 27, 2025
0

Popular technician Charting Guy (@ChartingGuy) calls Shiba Inu “weak and choppy” and suggests the token may not break out until...

edit post
This New Crypto Scam Starts With “Congratulations, You’re Hired,” Kraken Warns

This New Crypto Scam Starts With “Congratulations, You’re Hired,” Kraken Warns

by TheAdviserMagazine
October 27, 2025
0

TMGM Broker Review 2025: Regulation, Platforms & Trading Conditions Explained | Finance Magnates TMGM Broker Review 2025: Regulation, Platforms &...

edit post
HTX Research Report Spotlights SunPerp as the Breakout Player in the 2025 Perpetual DEX Boom

HTX Research Report Spotlights SunPerp as the Breakout Player in the 2025 Perpetual DEX Boom

by TheAdviserMagazine
October 27, 2025
0

This content is provided by a sponsor. PRESS RELEASE. Panama City, October 27, 2025 — HTX Research, the dedicated research...

edit post
What Happens When You Don’t Report Your Crypto Taxes to the IRS

What Happens When You Don’t Report Your Crypto Taxes to the IRS

by TheAdviserMagazine
October 27, 2025
0

Key takeawaysTax authorities like the IRS, HMRC and ATO classify crypto as a capital asset, meaning that sales, trades and...

Next Post
edit post
Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

edit post
The Five Habits of Highly Effective Real Estate Investors

The Five Habits of Highly Effective Real Estate Investors

  • Trending
  • Comments
  • Latest
edit post
77-year-old popular furniture retailer closes store locations

77-year-old popular furniture retailer closes store locations

October 18, 2025
edit post
Pennsylvania House of Representatives Rejects Update to Child Custody Laws

Pennsylvania House of Representatives Rejects Update to Child Custody Laws

October 7, 2025
edit post
What to Do When a Loved One Dies in North Carolina

What to Do When a Loved One Dies in North Carolina

October 8, 2025
edit post
Another Violent Outburst – Democrats Inciting Civil Unrest

Another Violent Outburst – Democrats Inciting Civil Unrest

October 24, 2025
edit post
Probate vs. Non-Probate Assets: What’s the Difference?

Probate vs. Non-Probate Assets: What’s the Difference?

October 17, 2025
edit post
California Attorney Pleads Guilty For Role In 2M Ponzi Scheme

California Attorney Pleads Guilty For Role In $912M Ponzi Scheme

October 15, 2025
edit post
Harvard says it’s been giving too many A grades to students

Harvard says it’s been giving too many A grades to students

0
edit post
Give Up on These Overrated Retirement Tropes

Give Up on These Overrated Retirement Tropes

0
edit post
How Long After Death Must Probate Be Filed in North Carolina?

How Long After Death Must Probate Be Filed in North Carolina?

0
edit post
Regulator tells Leumi to stop marketing S&P 500-linked deposit

Regulator tells Leumi to stop marketing S&P 500-linked deposit

0
edit post
Why Financial Advisors Struggle to Embrace Bitcoin’s Rise

Why Financial Advisors Struggle to Embrace Bitcoin’s Rise

0
edit post
New Rothbard Letters Show He Rejected both Drug Abuse and the Drug War

New Rothbard Letters Show He Rejected both Drug Abuse and the Drug War

0
edit post
Harvard says it’s been giving too many A grades to students

Harvard says it’s been giving too many A grades to students

October 27, 2025
edit post
Competitive rates and military-focused banking

Competitive rates and military-focused banking

October 27, 2025
edit post
Workers are shouldering more pension risk than ever

Workers are shouldering more pension risk than ever

October 27, 2025
edit post
AI drives huge productivity gains for big companies, small ones left behind

AI drives huge productivity gains for big companies, small ones left behind

October 27, 2025
edit post
Virginia Attorney General Gets Green Light To Sue TikTok

Virginia Attorney General Gets Green Light To Sue TikTok

October 27, 2025
edit post
Landmark ruling in India treats XRP as property, not speculation

Landmark ruling in India treats XRP as property, not speculation

October 27, 2025
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Harvard says it’s been giving too many A grades to students
  • Competitive rates and military-focused banking
  • Workers are shouldering more pension risk than ever
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.