No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Sunday, May 10, 2026
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Cryptocurrency

Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

by TheAdviserMagazine
8 months ago
in Cryptocurrency
Reading Time: 7 mins read
A A
Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads
Share on FacebookShare on TwitterShare on LInkedIn


A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.

A major supply-chain attack has infiltrated widely
used JavaScript packages, potentially putting billions of dollars in crypto at
risk. Charles Guillemet, chief technology officer at hardware wallet maker
Ledger, warned that hackers have compromised a reputable developer’s Node
Package Manager (NPM) account to push malicious code into packages downloaded
more than a billion times.

The injected malware is designed to quietly swap
cryptocurrency wallet addresses in transactions, meaning users could
unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the
NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected
packages have already been downloaded over 1 billion times, meaning the entire
JavaScript ecosystem may be at risk.”

🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.

The malicious payload works…

— Charles Guillemet (@P3b7_) September 8, 2025

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely
used to integrate external packages into applications. When a developer’s
account is compromised, attackers can slip malware into packages that
developers then unknowingly deploy in decentralized applications or software
wallets.

Security researchers have warned that software wallet users
are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code
does not automatically drain wallets.

Explanation of the current npm hack

In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a “swap” button on a website, the code might replace the tx sent to your wallet with a tx sending money to…

— 0xngmi (@0xngmi) September 8, 2025

Developers who pin dependencies to older, safe
versions may avoid exposure, but users cannot easily verify which sites are
safe. Experts recommend avoiding crypto transactions until affected packages
are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing
Phishing

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno

Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno
Read this Term
emails sent to NPM
maintainers, claiming their accounts would be locked unless they “updated”
two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers
control of developer accounts. From there, malicious updates were pushed to
packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients’ Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack
operates “at multiple layers: altering content shown on websites, tampering
with API calls, and manipulating what users’ apps believe they are signing.”

ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*

Here’s how it works 👇

1) Injects itself into the browser

Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana,…

— Aikido Security (@AikidoSecurity) September 8, 2025

Developers and users have been urged to review dependencies
and delay crypto transactions until the packages are verified as safe. The
incident highlighted the risks inherent in widely used open-source software and
the potential for supply-chain attacks to affect billions of users.



Source link

Tags: AccountsaffectingattackCryptoDownloadsexploitHackersJavaScriptMassivereportedly
ShareTweetShare
Previous Post

Trump U.S. Open invitation from Rolex comes after slapping tariff on Switzerland

Next Post

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Related Posts

edit post
South Korea’s Crypto Market Loses Half Its Value as Stock Boom Pulls Investors Away

South Korea’s Crypto Market Loses Half Its Value as Stock Boom Pulls Investors Away

by TheAdviserMagazine
May 10, 2026
0

The value of cryptocurrency held by South Korean investors more than halved over the past year, falling from 121.8 trillion...

edit post
US and Iran announce framework to ease tensions, reopen Strait of Hormuz

US and Iran announce framework to ease tensions, reopen Strait of Hormuz

by TheAdviserMagazine
May 10, 2026
0

## Market Snapshot Iranian Demands Trump Will Agree To: Pricing suggests increased likelihood of US concessions. WTI Crude Oil Prices...

edit post
CLARITY Act: Banking Trade Groups Push For Yield Agreement Revision – Details

CLARITY Act: Banking Trade Groups Push For Yield Agreement Revision – Details

by TheAdviserMagazine
May 9, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure US banking trade groups have called for...

edit post
Strategy’s STRC Returns To 0 Par Value, Will Michael Saylor Resume Bitcoin Buying?

Strategy’s STRC Returns To $100 Par Value, Will Michael Saylor Resume Bitcoin Buying?

by TheAdviserMagazine
May 9, 2026
0

STRC, Strategy’s perpetual preferred stock, returned to its $100 par value during Friday’s trading session. It allows the company to...

edit post
Second Bitcoin ETF issuer predicts BTC hitting M

Second Bitcoin ETF issuer predicts BTC hitting $1M

by TheAdviserMagazine
May 9, 2026
0

Make CryptoSlate preferred on Matthew Sigel of VanEck said Bitcoin could reach $1 million by the next US Presidential term.That...

edit post
Chainlink Price Surges Above  For First Time Since January — Details

Chainlink Price Surges Above $10 For First Time Since January — Details

by TheAdviserMagazine
May 9, 2026
0

Opeyemi is a proficient writer and enthusiast in the exciting and unique cryptocurrency realm. While the digital asset industry was...

Next Post
edit post
Introducing The Insurance Agency Management Systems Landscape, Q3 2025

Introducing The Insurance Agency Management Systems Landscape, Q3 2025

edit post
The Five Habits of Highly Effective Real Estate Investors

The Five Habits of Highly Effective Real Estate Investors

  • Trending
  • Comments
  • Latest
edit post
Gavin Newsom issues ‘final warning’ amid California’s dire housing crisis — what’s at stake for millions of residents

Gavin Newsom issues ‘final warning’ amid California’s dire housing crisis — what’s at stake for millions of residents

May 3, 2026
edit post
Florida Warning: With Senior SNAP Benefits Averaging 8/Month, Thousands Risk Losing Assistance in 2026

Florida Warning: With Senior SNAP Benefits Averaging $188/Month, Thousands Risk Losing Assistance in 2026

April 27, 2026
edit post
Minnesota Wealth Tax | Intangible Personal Property Tax

Minnesota Wealth Tax | Intangible Personal Property Tax

May 6, 2026
edit post
10 Cheapest High Dividend Stocks With P/E Ratios Under 10

10 Cheapest High Dividend Stocks With P/E Ratios Under 10

April 13, 2026
edit post
Exclusive: America’s largest Black-owned bank launches podcast with mission to unlock hidden shame holding back generational wealth

Exclusive: America’s largest Black-owned bank launches podcast with mission to unlock hidden shame holding back generational wealth

April 29, 2026
edit post
NYC Mayor Mamdani knocked Ken Griffin in pied-a-terre tax promo. His firm calls the move ‘shameful’

NYC Mayor Mamdani knocked Ken Griffin in pied-a-terre tax promo. His firm calls the move ‘shameful’

April 23, 2026
edit post
‘This is the way’: Elon Musk endorses Warren Buffett’s famed 5-minute plan to fix the national debt

‘This is the way’: Elon Musk endorses Warren Buffett’s famed 5-minute plan to fix the national debt

0
edit post
Kalshi traders see odds rising that a U.S.-Iran nuclear deal will be reached by 2027

Kalshi traders see odds rising that a U.S.-Iran nuclear deal will be reached by 2027

0
edit post
Upside App — Earn Cash On Gas Purchases {Extra alt=

Upside App — Earn Cash On Gas Purchases {Extra $0.25/gallon cash back!}

0
edit post
Psychology suggests that adult children who are the most loyal to their parents in late life are often the ones who never quite became close to them — the loyalty is the substitute for the closeness that didn’t form, and the visits, the calls, the careful attention are sometimes a daughter’s way of paying for an intimacy that was supposed to have been included

Psychology suggests that adult children who are the most loyal to their parents in late life are often the ones who never quite became close to them — the loyalty is the substitute for the closeness that didn’t form, and the visits, the calls, the careful attention are sometimes a daughter’s way of paying for an intimacy that was supposed to have been included

0
edit post
IRS Tax Form 1099-OID Original Issue Discount

IRS Tax Form 1099-OID Original Issue Discount

0
edit post
Bayside buys Tara Tel Aviv dairy site

Bayside buys Tara Tel Aviv dairy site

0
edit post
‘This is the way’: Elon Musk endorses Warren Buffett’s famed 5-minute plan to fix the national debt

‘This is the way’: Elon Musk endorses Warren Buffett’s famed 5-minute plan to fix the national debt

May 10, 2026
edit post
Bayside buys Tara Tel Aviv dairy site

Bayside buys Tara Tel Aviv dairy site

May 10, 2026
edit post
South Korea’s Crypto Market Loses Half Its Value as Stock Boom Pulls Investors Away

South Korea’s Crypto Market Loses Half Its Value as Stock Boom Pulls Investors Away

May 10, 2026
edit post
Psychology suggests that adult children who are the most loyal to their parents in late life are often the ones who never quite became close to them — the loyalty is the substitute for the closeness that didn’t form, and the visits, the calls, the careful attention are sometimes a daughter’s way of paying for an intimacy that was supposed to have been included

Psychology suggests that adult children who are the most loyal to their parents in late life are often the ones who never quite became close to them — the loyalty is the substitute for the closeness that didn’t form, and the visits, the calls, the careful attention are sometimes a daughter’s way of paying for an intimacy that was supposed to have been included

May 10, 2026
edit post
Best money market account rates today, Sunday, May 10, 2026 (best account provides 4.01% APY)

Best money market account rates today, Sunday, May 10, 2026 (best account provides 4.01% APY)

May 10, 2026
edit post
Meet Goldman’s athlete whisperer: the woman who guards against B of fraud targeting sports wealth

Meet Goldman’s athlete whisperer: the woman who guards against $1B of fraud targeting sports wealth

May 10, 2026
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • ‘This is the way’: Elon Musk endorses Warren Buffett’s famed 5-minute plan to fix the national debt
  • Bayside buys Tara Tel Aviv dairy site
  • South Korea’s Crypto Market Loses Half Its Value as Stock Boom Pulls Investors Away
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.