No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Saturday, January 24, 2026
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Cryptocurrency

Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

by TheAdviserMagazine
5 months ago
in Cryptocurrency
Reading Time: 7 mins read
A A
Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads
Share on FacebookShare on TwitterShare on LInkedIn


A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.

A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.



Source link

Tags: AccountsaffectingattackCryptoDownloadsexploitHackersJavaScriptMassivereportedly
ShareTweetShare
Previous Post

Trump U.S. Open invitation from Rolex comes after slapping tariff on Switzerland

Next Post

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Related Posts

edit post
Binance Coin Price Outlook As Grayscale Files S-1 for BNB

Binance Coin Price Outlook As Grayscale Files S-1 for BNB

by TheAdviserMagazine
January 24, 2026
0

Binance Coin price has remained stable above $890, despite recent market corrections. The cryptocurrency’s price has been relatively flat, as...

edit post
Trend Pulse Confirms Structural Weakness

Trend Pulse Confirms Structural Weakness

by TheAdviserMagazine
January 23, 2026
0

Bitcoin continues to struggle as it attempts to reclaim the $90,000 level, with traders facing a market defined by hesitation...

edit post
Dormant Bitcoin Wallets Show Continued Activity Despite Sub–Six-Figure Prices

Dormant Bitcoin Wallets Show Continued Activity Despite Sub–Six-Figure Prices

by TheAdviserMagazine
January 23, 2026
0

While bitcoin has been stuck pacing between $87,600 and $91,100 over the past few days, a sizable cluster of long-silent...

edit post
Bitcoin’s 0,000 forecast slash proves the institutional “sure thing” is actually a high-stakes gamble for 2026

Bitcoin’s $150,000 forecast slash proves the institutional “sure thing” is actually a high-stakes gamble for 2026

by TheAdviserMagazine
January 23, 2026
0

Bitcoin price forecasts for 2026 from major banks, asset managers, and market commentators span a wide range, roughly from $75,000...

edit post
Stablecoins Emerge as Financial Rails in Africa, Says Former UN Official

Stablecoins Emerge as Financial Rails in Africa, Says Former UN Official

by TheAdviserMagazine
January 23, 2026
0

Stablecoins are increasingly being used across Africa as a cheaper and faster remittance option, with remittances becoming “more important than...

edit post
Following Bitcoin and Ether, Grayscale Files with SEC for Spot BNB ETF on Nasdaq

Following Bitcoin and Ether, Grayscale Files with SEC for Spot BNB ETF on Nasdaq

by TheAdviserMagazine
January 23, 2026
0

Blueberry Broker Review 2026: Regulation, Platforms, Fees & Trading Conditions | Finance Magnates Blueberry Broker Review 2026: Regulation, Platforms, Fees...

Next Post
edit post
Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

edit post
The Five Habits of Highly Effective Real Estate Investors

The Five Habits of Highly Effective Real Estate Investors

  • Trending
  • Comments
  • Latest
edit post
Most People Buy Mansions But This Virginia Lottery Winner Took the Lump Sum From a 8 Million Jackpot and Bought a Zero-Turn Lawn Mower Instead

Most People Buy Mansions But This Virginia Lottery Winner Took the Lump Sum From a $348 Million Jackpot and Bought a Zero-Turn Lawn Mower Instead

January 10, 2026
edit post
Utility Shutoff Policies Are Changing in Several Midwestern States

Utility Shutoff Policies Are Changing in Several Midwestern States

January 9, 2026
edit post
80-year-old Home Depot rival shuts down location, no bankruptcy

80-year-old Home Depot rival shuts down location, no bankruptcy

January 4, 2026
edit post
Tennessee theater professor reinstated, with 0,000 settlement, after losing his job over a Charlie Kirk-related social media post

Tennessee theater professor reinstated, with $500,000 settlement, after losing his job over a Charlie Kirk-related social media post

January 8, 2026
edit post
Warren Buffett retires on December 31 and leaves behind a manual for a life in investing

Warren Buffett retires on December 31 and leaves behind a manual for a life in investing

December 27, 2025
edit post
Elon Musk Left DOGE… But He Hasn’t Left Washington

Elon Musk Left DOGE… But He Hasn’t Left Washington

January 2, 2026
edit post
Rule Changes From AB 835 in California Could Shift the Multifamily Market in Big Ways

Rule Changes From AB 835 in California Could Shift the Multifamily Market in Big Ways

0
edit post
In the Company of Mavericks: Mark Thornton on the Austrian Comeback

In the Company of Mavericks: Mark Thornton on the Austrian Comeback

0
edit post
Binance Coin Price Outlook As Grayscale Files S-1 for BNB

Binance Coin Price Outlook As Grayscale Files S-1 for BNB

0
edit post
Activity Thresholds Dropped for Over-45 Users — Raising Risk of Lower Scores

Activity Thresholds Dropped for Over-45 Users — Raising Risk of Lower Scores

0
edit post
Stratasys enables Subaru to halve tool development time

Stratasys enables Subaru to halve tool development time

0
edit post
Chase Sapphire Cardholders Get a Shot at World Cup Tickets

Chase Sapphire Cardholders Get a Shot at World Cup Tickets

0
edit post
In the Company of Mavericks: Mark Thornton on the Austrian Comeback

In the Company of Mavericks: Mark Thornton on the Austrian Comeback

January 24, 2026
edit post
Activity Thresholds Dropped for Over-45 Users — Raising Risk of Lower Scores

Activity Thresholds Dropped for Over-45 Users — Raising Risk of Lower Scores

January 24, 2026
edit post
The 30-year drops to an important baseline

The 30-year drops to an important baseline

January 24, 2026
edit post
Binance Coin Price Outlook As Grayscale Files S-1 for BNB

Binance Coin Price Outlook As Grayscale Files S-1 for BNB

January 24, 2026
edit post
Psychology says people who don’t fear being alone often develop these 8 forms of confidence

Psychology says people who don’t fear being alone often develop these 8 forms of confidence

January 24, 2026
edit post
Kotak Mahindra Bank Q3 results: Standalone PAT rises 4% YoY, NII grows 5%

Kotak Mahindra Bank Q3 results: Standalone PAT rises 4% YoY, NII grows 5%

January 24, 2026
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • In the Company of Mavericks: Mark Thornton on the Austrian Comeback
  • Activity Thresholds Dropped for Over-45 Users — Raising Risk of Lower Scores
  • The 30-year drops to an important baseline
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.