No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Monday, March 30, 2026
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Cryptocurrency

Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

by TheAdviserMagazine
7 months ago
in Cryptocurrency
Reading Time: 7 mins read
A A
Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads
Share on FacebookShare on TwitterShare on LInkedIn


A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.

A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.



Source link

Tags: AccountsaffectingattackCryptoDownloadsexploitHackersJavaScriptMassivereportedly
ShareTweetShare
Previous Post

Trump U.S. Open invitation from Rolex comes after slapping tariff on Switzerland

Next Post

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Related Posts

edit post
Iran Speaker predicts pre-market “reverse indicator” then Bitcoin climbed before the S&P500

Iran Speaker predicts pre-market “reverse indicator” then Bitcoin climbed before the S&P500

by TheAdviserMagazine
March 30, 2026
0

Mohammad Bagher Ghalibaf, the speaker of Iran’s parliament, posted a striking piece of market commentary on X before the latest...

edit post
Expert Predicts alt=

Expert Predicts $0.80 On Bitcoin’s Potential Retreat To $60,000

by TheAdviserMagazine
March 30, 2026
0

Ronaldo is an experienced crypto enthusiast dedicated to the nascent and ever-evolving industry. With over five years of extensive research...

edit post
New ETF Filing Targets Bitcoin Treasury Companies With Strategy Inc at Center – Featured Bitcoin News

New ETF Filing Targets Bitcoin Treasury Companies With Strategy Inc at Center – Featured Bitcoin News

by TheAdviserMagazine
March 30, 2026
0

Bitcoin-Linked Income ETF Strategy Without Direct Holdings Rising demand for income tied to bitcoin-linked corporate exposure is shaping new ETF...

edit post
Bernstein Says Crypto Equities at 60% Discount as Tokenization Trade Begins

Bernstein Says Crypto Equities at 60% Discount as Tokenization Trade Begins

by TheAdviserMagazine
March 30, 2026
0

Broker Bernstein told clients on Monday that the steep selloff in crypto-linked equities had created a more attractive entry point...

edit post
Bitcoin Spot ETFs Break 4-Week Positive Streak With 6M Outflow

Bitcoin Spot ETFs Break 4-Week Positive Streak With $296M Outflow

by TheAdviserMagazine
March 29, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure Bitcoin price struggles over the last week...

edit post
Coinbase Accused of XRP Pay to Play Listing Scheme

Coinbase Accused of XRP Pay to Play Listing Scheme

by TheAdviserMagazine
March 29, 2026
0

Coinbase is facing additional attention after claims resurfaced about how XRP was listed on the exchange. The issue traces back...

Next Post
edit post
Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

edit post
The Five Habits of Highly Effective Real Estate Investors

The Five Habits of Highly Effective Real Estate Investors

  • Trending
  • Comments
  • Latest
edit post
Massachusetts loses billions in income after millionaire tax

Massachusetts loses billions in income after millionaire tax

March 24, 2026
edit post
Illinois’ Paid Leave for All Workers Act Takes Effect — Every Employee Now Gets Guaranteed Time Off

Illinois’ Paid Leave for All Workers Act Takes Effect — Every Employee Now Gets Guaranteed Time Off

March 27, 2026
edit post
Publix to Open 5 New Stores by End of April. See Upcoming Locations.

Publix to Open 5 New Stores by End of April. See Upcoming Locations.

March 20, 2026
edit post
Hospitals in This State Routinely Sue Patients Over Unpaid Bills

Hospitals in This State Routinely Sue Patients Over Unpaid Bills

March 27, 2026
edit post
Virginia Permits ADULT MIGRANT MEN To Attend High School

Virginia Permits ADULT MIGRANT MEN To Attend High School

March 30, 2026
edit post
Who Is Legally Next of Kin in North Carolina?

Who Is Legally Next of Kin in North Carolina?

February 28, 2026
edit post
Professional tax planning by CPAs: Why experts lead

Professional tax planning by CPAs: Why experts lead

0
edit post
Bank of Israel keeps rate unchanged, cuts growth forecast

Bank of Israel keeps rate unchanged, cuts growth forecast

0
edit post
7 Ways the Iran Conflict Is Draining Your Wallet

7 Ways the Iran Conflict Is Draining Your Wallet

0
edit post
Can the Market Economy Be Trusted?

Can the Market Economy Be Trusted?

0
edit post
Iran Speaker predicts pre-market “reverse indicator” then Bitcoin climbed before the S&P500

Iran Speaker predicts pre-market “reverse indicator” then Bitcoin climbed before the S&P500

0
edit post
Why Alts Command High Fees

Why Alts Command High Fees

0
edit post
Not everyone who cancels plans at the last minute is flaky. Some of them said yes from the version of themselves that felt capable that morning and then spent the entire day slowly losing access to that person.

Not everyone who cancels plans at the last minute is flaky. Some of them said yes from the version of themselves that felt capable that morning and then spent the entire day slowly losing access to that person.

March 30, 2026
edit post
Tesla Plans to Deploy Optimus in Its Factories First — Labor Groups Say Robots Could Displace Human Workers

Tesla Plans to Deploy Optimus in Its Factories First — Labor Groups Say Robots Could Displace Human Workers

March 30, 2026
edit post
Hawaiian Airlines to Add 20-Minute Bag Guarantee in April

Hawaiian Airlines to Add 20-Minute Bag Guarantee in April

March 30, 2026
edit post
7 Ways the Iran Conflict Is Draining Your Wallet

7 Ways the Iran Conflict Is Draining Your Wallet

March 30, 2026
edit post
Professional tax planning by CPAs: Why experts lead

Professional tax planning by CPAs: Why experts lead

March 30, 2026
edit post
California Targets AI Hiring Tools With New Rules Requiring Bias Checks and Applicant Disclosure

California Targets AI Hiring Tools With New Rules Requiring Bias Checks and Applicant Disclosure

March 30, 2026
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Not everyone who cancels plans at the last minute is flaky. Some of them said yes from the version of themselves that felt capable that morning and then spent the entire day slowly losing access to that person.
  • Tesla Plans to Deploy Optimus in Its Factories First — Labor Groups Say Robots Could Displace Human Workers
  • Hawaiian Airlines to Add 20-Minute Bag Guarantee in April
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.