No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Sunday, February 15, 2026
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Cryptocurrency

Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

by TheAdviserMagazine
5 months ago
in Cryptocurrency
Reading Time: 7 mins read
A A
Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads
Share on FacebookShare on TwitterShare on LInkedIn


A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.

A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.



Source link

Tags: AccountsaffectingattackCryptoDownloadsexploitHackersJavaScriptMassivereportedly
ShareTweetShare
Previous Post

Trump U.S. Open invitation from Rolex comes after slapping tariff on Switzerland

Next Post

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Related Posts

edit post
Bitcoin Price To Bottom At K? On-Chain Indicator Says Yes

Bitcoin Price To Bottom At $45K? On-Chain Indicator Says Yes

by TheAdviserMagazine
February 15, 2026
0

The Bitcoin price remains in a fragile phase in its broader market structure, alternating between recovery attempts and lingering macro...

edit post
Latam Insights: Brazil’s 1 Million Bitcoin Strategic Reserve Bill Introduced, Stablecoin Taxation Also in the Works

Latam Insights: Brazil’s 1 Million Bitcoin Strategic Reserve Bill Introduced, Stablecoin Taxation Also in the Works

by TheAdviserMagazine
February 15, 2026
0

Welcome to Latam Insights, a compilation of the most relevant crypto news from Latin America over the past week. In...

edit post
Senators Urge CFIUS Probe of 0M UAE Stake in Trump-Linked WLFI

Senators Urge CFIUS Probe of $500M UAE Stake in Trump-Linked WLFI

by TheAdviserMagazine
February 15, 2026
0

Two US senators are pressing the Treasury Department to investigate a reported foreign investment in a crypto venture tied to...

edit post
Chainlink co-founder Sergey Nazarov appointed to CFTC advisory body

Chainlink co-founder Sergey Nazarov appointed to CFTC advisory body

by TheAdviserMagazine
February 14, 2026
0

The group brings together stakeholders from traditional and digital finance to advise on the growing role of technologies such as...

edit post
Bitcoin Indicator Shows Market At Liquidity Equilibrium – What Next?

Bitcoin Indicator Shows Market At Liquidity Equilibrium – What Next?

by TheAdviserMagazine
February 14, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure The current market landscape for Bitcoin remains...

edit post
How Could Brazil’s Strategic Bitcoin Reserve Proposal Impact BTC?

How Could Brazil’s Strategic Bitcoin Reserve Proposal Impact BTC?

by TheAdviserMagazine
February 14, 2026
0

Bitcoin price has recently climbed back to $70,000, fueled by a softer-than-expected U.S. inflation report that relieved market concerns. This...

Next Post
edit post
Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

edit post
The Five Habits of Highly Effective Real Estate Investors

The Five Habits of Highly Effective Real Estate Investors

  • Trending
  • Comments
  • Latest
edit post
Medicare Fraud In California – 2.5% Of The Population Accounts For 18% Of NATIONWIDE Healthcare Spending

Medicare Fraud In California – 2.5% Of The Population Accounts For 18% Of NATIONWIDE Healthcare Spending

February 3, 2026
edit post
North Carolina Updates How Wills Can Be Stored

North Carolina Updates How Wills Can Be Stored

February 10, 2026
edit post
Where Is My 2025 Oregon State Tax Refund

Where Is My 2025 Oregon State Tax Refund

February 13, 2026
edit post
Key Nevada legislator says lawmakers will push for independent audit of altered public record in Nevada OSHA’s Boring Company inspection 

Key Nevada legislator says lawmakers will push for independent audit of altered public record in Nevada OSHA’s Boring Company inspection 

February 4, 2026
edit post
Grand Rapids Could Become a Boomtown as Investment Money Pours In

Grand Rapids Could Become a Boomtown as Investment Money Pours In

February 12, 2026
edit post
Where Is My South Carolina Tax Refund

Where Is My South Carolina Tax Refund

January 30, 2026
edit post
Domestic healthcare demand underpins hospitals ETF thesis: Groww CEO

Domestic healthcare demand underpins hospitals ETF thesis: Groww CEO

0
edit post
What’s Open and Closed on Presidents Day 2026? Here’s What to Know

What’s Open and Closed on Presidents Day 2026? Here’s What to Know

0
edit post
Investment Opportunities in Mexico – CFA Institute Enterprising Investor

Investment Opportunities in Mexico – CFA Institute Enterprising Investor

0
edit post
Gasoline-starved California is turning to fuel from the Bahamas

Gasoline-starved California is turning to fuel from the Bahamas

0
edit post
How to Turn a Book Club Into a Financial Tool

How to Turn a Book Club Into a Financial Tool

0
edit post
Psychology says people who always put their shopping cart back in the corral instead of leaving it in the parking lot usually display these 9 distinct qualities

Psychology says people who always put their shopping cart back in the corral instead of leaving it in the parking lot usually display these 9 distinct qualities

0
edit post
Gasoline-starved California is turning to fuel from the Bahamas

Gasoline-starved California is turning to fuel from the Bahamas

February 15, 2026
edit post
Grey Marriages: 7 Financial Secrets Couples Over 60 Rarely Share Until It’s Too Late

Grey Marriages: 7 Financial Secrets Couples Over 60 Rarely Share Until It’s Too Late

February 15, 2026
edit post
Psychology says people who always put their shopping cart back in the corral instead of leaving it in the parking lot usually display these 9 distinct qualities

Psychology says people who always put their shopping cart back in the corral instead of leaving it in the parking lot usually display these 9 distinct qualities

February 15, 2026
edit post
If a Stock Market Crash Is Coming, This 1 Investing Move Is Critical Right Now

If a Stock Market Crash Is Coming, This 1 Investing Move Is Critical Right Now

February 15, 2026
edit post
Annual inflation in Israel falls below 2%

Annual inflation in Israel falls below 2%

February 15, 2026
edit post
What’s Open and Closed on Presidents Day 2026? Here’s What to Know

What’s Open and Closed on Presidents Day 2026? Here’s What to Know

February 15, 2026
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Gasoline-starved California is turning to fuel from the Bahamas
  • Grey Marriages: 7 Financial Secrets Couples Over 60 Rarely Share Until It’s Too Late
  • Psychology says people who always put their shopping cart back in the corral instead of leaving it in the parking lot usually display these 9 distinct qualities
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.