NPM Attack on Core JavaScript Libraries Puts Millions of Crypto Users at Risk

Exploit

Getting your Trinity Audio player ready...
  • Hackers injected malware into core JavaScript libraries with 1B+ weekly downloads.
  • Malware swaps crypto wallet addresses, targeting software wallet users.
  • Attack exploited NPM maintainer accounts through phishing.

A massive security breach has rocked the open-source ecosystem after hackers compromised widely used JavaScript libraries, including chalk and strip-ansi, in what security experts are calling the largest supply chain attack in history. The malicious code, designed to steal crypto by hijacking wallet addresses, has already been downloaded billions of times, raising fears across the software and blockchain communities.

Billions of Downloads Exposed to Malware

The attack targeted small but foundational utilities such as chalk, strip-ansi, and color-convert — libraries deeply embedded in the dependency trees of countless apps. According to Ledger CTO Charles Guillemet, the affected packages have been downloaded over one billion times, putting much of the JavaScript ecosystem at risk.

Source: Minal Thukral on X

The malware acts as a “crypto-clipper,” silently swapping wallet addresses during transactions. Users relying on software wallets are particularly vulnerable, while hardware wallet users remain protected if they confirm each transaction manually.

Phishing Campaign Opened the Door

Investigations reveal that attackers gained access to the Node Package Manager (NPM) account of a reputable developer via phishing emails. Maintainers were tricked into logging into a fake site that stole credentials under the guise of a two-factor authentication update. Once inside, hackers pushed malicious updates to popular packages, affecting millions of unsuspecting developers.

“This attack operated at multiple layers — altering website content, tampering with API calls, and even manipulating what users believe they’re signing,” said Charlie Eriksen, researcher at Aikido Security.

Also Read: Lost Your Crypto Wallet in 2025? Here’s the Step-by-Step Recovery Guide

Wider Implications for Open-Source Security

The breach underscores the fragility of the open-source software supply chain. Developers worldwide depend on NPM packages as building blocks for apps, often without realizing how many indirect dependencies they inherit. With crypto-related malware now hiding in such common libraries, the attack highlights a growing convergence of cybersecurity and financial risk.

Conclusion

As investigations continue, experts urge developers to verify dependencies, monitor for unusual activity, and encourage end users to rely on hardware wallets. The incident serves as a stark reminder that even the smallest open-source packages can become vectors for large-scale attacks.