🎁 Ace quick missions & earn crypto rewards while gaining real-world Web3 skills. JOIN NOW! 🔥

NPM Hack Exposes Crypto Apps to Silent Wallet Address Swaps

Key Takeaways

  • ​A phishing scam led to 18 NPM packages being altered to hijack wallet addresses in crypto apps using automatic updates;
  • Ledger’s CTO warned that one line of bad code in a software wallet or exchange can lead to total loss of user funds;
  • TON’s CTO advised devs to check for compromised versions and rebuild apps if affected, as several blockchains were targeted.

Ace quick missions & earn crypto rewards while gaining real-world Web3 skills. Participate Now! 🔥

NPM Hack Exposes Crypto Apps to Silent Wallet Address Swaps

Charles Guillemet, Chief Technology Officer at Ledger, pointed to a recent Node Package Manager (NPM) library attack as a reminder of the risks tied to software wallets and crypto exchanges.

He warned that funds stored on these platforms could be lost through a single line of compromised code. According to Guillemet, software-based systems remain vulnerable to supply chain attacks, where malicious updates enter through trusted tools.

The breach began when attackers sent a phishing email disguised as a message from NPM support. This led to stolen developer credentials, which were used to publish altered versions of used packages such as chalk, debug, and strip-ansi.

What Does Staking Mean in Crypto? (Easily Explained!)

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe - We publish new crypto explainer videos every week!

This code worked by switching out wallet addresses in network traffic. When an app communicated with a blockchain, the malicious code would replace the destination address with one controlled by the attacker.

Bitcoin BTC $113,581.97 , Ethereum ETH $4,337.36 , Solana SOL $222.78 , Tron TRX $0.3378 , and Litecoin LTC $115.54 networks were all targeted in this way.

Anatoly Makosov, CTO of The Open Network (TON), explained that the attackers tampered with specific releases, 18 versions in total. He noted that apps were at the highest risk if they integrated the affected packages within hours of their release or if they used systems that automatically update dependencies.

Makosov encouraged developers to check whether these versions were present. He also shared a checklist for developers to help identify whether their applications were impacted.

If any of the 18 compromised library versions were in use, the project should be treated as affected.

Lucija Valentić at ReversingLabs recently reported that hackers discovered a new method for spreading malicious software. How? Read the full story.

Aaron S. Editor-In-Chief
Having completed a Master’s degree in Economics, Politics, and Cultures of the East Asia region, Aaron has written scientific papers analyzing the differences between Western and Collective forms of capitalism in the post-World War II era.
With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.
Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.
Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.

Loading...
binance
×
Verified

CLAIM $100 BONUS

Changelly Welcome Reward
Rating
5.0