Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Open Source Community Thwarts Massive npm Supply Chain Attack
Cyber Security

Open Source Community Thwarts Massive npm Supply Chain Attack

Team-CWDBy Team-CWDSeptember 11, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A potential npm supply chain disaster was averted in record time after attackers took over a verified developer’s credentials.

On September 8, Josh Junon, a developer with over 1800 GitHub contributions in the last year, confirmed on Bluesky his npm account was compromised. Junon had been alerted by other users that his account had started posting packages with backdoors to all popular packages the developer was involved in.

The developer, commonly known as ‘qix,’ said he received an email to reset his two-factor authentication (2FA) that looked “very legitimate,” but that was malicious.

He added that it only involved his npm account and that he was in contact with NPM to resolve the issue.

Compromised npm Packages

The compromised ‘qix’ npm account published malicious versions for dozens of packages Junon was involved in.

These included some npm packages for high-volume JavaScript projects:

  • chalk (approximately 300 million weekly downloads)
  • strip-ansi (approximately 261 million weekly downloads)
  • color-convert (approximately 193 million weekly downloads)
  • color-name (approximately 191 million weekly downloads)
  • error-ex (approximately 47 million weekly downloads)
  • simple-swizzle approximately 26 million weekly downloads)
  • has-ansi (approximately 12 million weekly downloads)

The payload implanted in the malicious packages is a crypto-clipper that steals funds by swapping wallet addresses in network requests and directly hijacking crypto transactions.

Crypto-Stealer Attack Chain Explained

This sophisticated malware targets cryptocurrency users through two main attack vectors.

First, it checks if a wallet extension (like MetaMask) is present. If not, it launches a passive address-swapping attack, intercepting all web traffic by hijacking the browser’s fetch and XMLHttpRequest functions. The malware then replaces legitimate crypto addresses with attacker-controlled ones, using the Levenshtein distance algorithm to pick the most visually similar address, making the swap nearly undetectable to the naked eye.

If a wallet is detected, the malware escalates to active transaction hijacking. It intercepts outgoing transactions (e.g., eth_sendTransaction) and modifies the recipient address in memory before the user signs it. The victim sees a legitimate-looking confirmation screen, but if they don’t verify the address carefully their funds are sent straight to the attacker.

The attack chain is stealthy and automated, exploiting both human perception (via address spoofing) and technical vulnerabilities (via wallet API manipulation). By compromising a trusted npm package, the malware spreads silently, infecting websites and stealing funds without raising immediate suspicion.

One of the primary Ethereum addresses used in the attack is 0xFc4a4858bafef54D1b1d7697bfb5c52F4c166976. People can see its activity live on Ethereum-scanning website Etherscan to traxksome of the stolen funds

A GitHub Gist listing all affected wallets has also been created.

An Averted Crisis that Should Be “Celebrated”

Four hours after Junon confirmed the compromise, he shared a message from NPM saying that all impacted package versions had been taken down.

While many people started calling this hack the “biggest supply chain attack in history” on social media, many voices have challenged this narrative.

Josh Bressers, VP of security at Anchore, said on LinkedIn: “Here’s the thing nobody seems to be talking about. This all lasted for only a few hours. It’s amazing how fast open source can respond to things like this. Everyone works together. Information can be shared. The number of people now working on this isn’t just larger than your security team, it’s larger than your company.”

Katie Paxton-Fear, an ethical hacker who recently started working as a staff security advocate at Semgrep, published a video on LinkedIn emphasizing that a major crisis has been averted.

“Obviously, any security breach is bad, but this is not the major security breach that people are making it out to be,” she said.

She highlighted that the estimated total loss only amounted to $20, thanks primarily to the rapid response of the open source community.

“The malware was noticed and people started talking about it on GitHub within only 15 minutes of the malicious packages going live. Some of the packages were taken down by maintainers just one hour after the compromise happened, and the rest of them by NPM within two hours,” she explained.

According to Arda Büyükkaya, a senior cyber threat intelligence analyst at EclecticIQ, the attacker’s crypto address shows $66.52.

Nevertheless, Paxton-Fear argued that this incident is “a win that shows that the open source model works and that should be celebrated.”

In another LinkedIn post, Melissa Bischoping, the senior director of security and product design research at Tanium, went further: “If you’re panicking about that NPM thing, please don’t. There’s a virtually 0 chance you’re impacted by this, and you should not burn your teams by having them pick apart every corner of your infrastructure for evidence of these compromised packages.”

She continued: “These were up for a couple of hours on a Monday morning (US time) The chances of them being downloaded and shipped into your software in that window of time are very, very small – nearly 0. Of all of the things I think you should have your team pull late nights for, this isn’t one of them.”

How to Mitigate This Threat

However, those who still think they may be affected can take immediate action to block vulnerable dependencies.

According to Jan-David Stärk, a team lead and software engineer at Hansalog, to force-safe versions across an entire project, developers can use overrides in their package.json, by adding the following to pin trusted versions of the compromised packages:

{

  “name”: “your-project”,

  “version”: “1.0.0”,

  “overrides”: {

    “chalk”: “5.3.0”,

    “strip-ansi”: “7.1.0”,

    “color-convert”: “2.0.1”,

    “color-name”: “1.1.4”,

    “is-core-module”: “2.13.1”,

    “error-ex”: “1.3.2”,

    “has-ansi”: “5.0.1”

  }

}

Then, developers should clean their project by deleting node_modules and package-lock.json, then run npm install to generate a fresh, secure lockfile.

This will ensure that no malicious versions remain in their dependency tree.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSalty2FA Phishing Kit Unveils New Level of Sophistication
Next Article Chinese APT Actor Compromises Military Firm with Novel Fileless Malwar
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Common Apple Pay scams, and how to stay safe

January 22, 2026

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.