Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

Monday, 08/09/2025 | 21:31 GMT by Jared Kirui
  • Ledger CTO Charles Guillemet warned on X that a major supply chain attack is underway after a developer’s NPM account was compromised.
  • Software wallet users are particularly vulnerable, while hardware wallets reportedly remain largely protected from the attack.
hack dark web

A major supply-chain attack has infiltrated widely used JavaScript packages, potentially putting billions of dollars in crypto at risk. Charles Guillemet, chief technology officer at hardware wallet maker Ledger, warned that hackers have compromised a reputable developer’s Node Package Manager (NPM) account to push malicious code into packages downloaded more than a billion times.

The injected malware is designed to quietly swap cryptocurrency wallet addresses in transactions, meaning users could unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.”

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely used to integrate external packages into applications. When a developer’s account is compromised, attackers can slip malware into packages that developers then unknowingly deploy in decentralized applications or software wallets.

Security researchers have warned that software wallet users are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code does not automatically drain wallets.

Developers who pin dependencies to older, safe versions may avoid exposure, but users cannot easily verify which sites are safe. Experts recommend avoiding crypto transactions until affected packages are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing emails sent to NPM maintainers, claiming their accounts would be locked unless they “updated” two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers control of developer accounts. From there, malicious updates were pushed to packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients' Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack operates “at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users’ apps believe they are signing.”

Developers and users have been urged to review dependencies and delay crypto transactions until the packages are verified as safe. The incident highlighted the risks inherent in widely used open-source software and the potential for supply-chain attacks to affect billions of users.

A major supply-chain attack has infiltrated widely used JavaScript packages, potentially putting billions of dollars in crypto at risk. Charles Guillemet, chief technology officer at hardware wallet maker Ledger, warned that hackers have compromised a reputable developer’s Node Package Manager (NPM) account to push malicious code into packages downloaded more than a billion times.

The injected malware is designed to quietly swap cryptocurrency wallet addresses in transactions, meaning users could unknowingly send funds directly to attackers.

“There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised,” Guillemet explained. “The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk.”

Supply Chain Attack Hits Deep Into Developer Ecosystem

NPM is a core tool in JavaScript development, widely used to integrate external packages into applications. When a developer’s account is compromised, attackers can slip malware into packages that developers then unknowingly deploy in decentralized applications or software wallets.

Security researchers have warned that software wallet users are particularly vulnerable, while hardware wallets remain largely protected. According to Oxngmi, founder of DefiLlama, the code does not automatically drain wallets.

Developers who pin dependencies to older, safe versions may avoid exposure, but users cannot easily verify which sites are safe. Experts recommend avoiding crypto transactions until affected packages are cleaned up.

Phishing Emails and Account Takeover

The breach reportedly began with phishing emails sent to NPM maintainers, claiming their accounts would be locked unless they “updated” two-factor authentication by Sept. 10.

The fake site captured credentials, giving attackers control of developer accounts. From there, malicious updates were pushed to packages downloaded billions of times.

Related: Regulator Claims 9,000+ Clients' Data Hit Dark Web in Security Breach

Charlie Eriksen of Aikido Security said the attack operates “at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users’ apps believe they are signing.”

Developers and users have been urged to review dependencies and delay crypto transactions until the packages are verified as safe. The incident highlighted the risks inherent in widely used open-source software and the potential for supply-chain attacks to affect billions of users.

About the Author: Jared Kirui
Jared Kirui
  • 2449 Articles
  • 50 Followers
About the Author: Jared Kirui
Jared is an experienced financial journalist passionate about all things forex and CFDs.
  • 2449 Articles
  • 50 Followers

More from the Author

CryptoCurrency

!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|} !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}