NPM Supply Chain Breach Could Have Redirected Ethereum Transactions via Malicious JavaScript Packages

  • Supply chain breach of NPM packages introduced a crypto-clipper

  • Attack targeted Ethereum and Solana wallets via address-replacing malware in dependencies

  • Malicious address identified as 0xFc4a48; researchers report under $50 stolen so far

NPM supply chain attack injected a crypto-clipper into JavaScript libraries; learn how to check wallets and protect funds — read the full breakdown and steps to stay secure.






What was the NPM supply chain attack that targeted crypto wallets?

The NPM supply chain attack was a compromise of a developer’s NPM account that allowed attackers to inject a crypto-clipper into popular JavaScript libraries. The malware silently replaces wallet addresses during transactions, targeting Ethereum and Solana users; researchers report less than $50 stolen so far.

How did attackers distribute the crypto-clipper through JavaScript libraries?

Attackers gained access to a widely used NPM developer account and modified packages buried deep in dependency trees. The compromised packages include chalk, strip-ansi, and color-convert, each downloaded hundreds of millions to billions of times, thereby exposing countless projects and developer workstations.

01992b4c 9f4b 7eda 9021 1850d037005d
Source: Security Alliance

Which wallets and addresses were affected and what was stolen?

Security Alliance reports the attackers specifically aimed at Ethereum and Solana transactions. Blockchain monitoring shows the suspected malicious address as 0xFc4a48. Initial takings were tiny — 5 US cents in ETH and roughly $20 in memecoins — later aggregated to under $50 at the time of reporting.

Reported takings by asset (approximate)
Asset Reported Amount
Ether (ETH) $0.05 (initially reported)
Memecoins (BRETT, ANDY, DORK, VISTA, GONDOLA) ~$20
Total reported so far <$50

Why are dependency packages like chalk a high-risk vector?

Small utility packages are deeply nested in many projects’ dependency trees. Developers frequently inherit these modules without direct installs, creating a wide blast radius when trusted packages are compromised. The high download counts mean a single compromised maintainer account can affect millions of developer environments.

What should developers and users do now to mitigate risk?

Experts recommend immediate auditing of recent installs and running integrity checks on dependencies. Ledger’s CTO Charles Guillemet urged extra caution when confirming on-chain transactions. Practical steps include verifying wallet addresses manually, using hardware wallets for high-value transfers, and scanning workstations for suspicious processes.

Frequently Asked Questions

How can I check if my project used a compromised package?

Check package-lock.json or yarn.lock for references to chalk, strip-ansi, or color-convert, review recent package updates, and compare checksums against known clean releases. Use offline verification or reproduce builds in an isolated environment.

Can the crypto-clipper infect non-crypto projects?

Yes. Because the clipper modifies clipboard or transaction data at the system level, any developer workstation or user environment that performs clipboard-based or injected address operations could be at risk, regardless of whether the project is crypto-native.

Is my crypto safe if I use a hardware wallet?

Hardware wallets significantly reduce risk because they require on-device confirmation of transaction outputs. However, users should still verify receiving addresses on the hardware device’s screen and keep firmware up to date.



Key Takeaways

  • Widespread impact: Small utility packages can affect millions when compromised.
  • Low reported loss, high risk: Under $50 stolen so far, but potential exposure remains large.
  • Immediate action: Audit dependencies, verify checksums, use hardware wallets, and scan developer machines.

Conclusion

This NPM supply chain attack demonstrates how a single compromised maintainer account can propagate a crypto-clipper across the JavaScript ecosystem. Security Alliance and blockchain monitors have flagged the malicious address 0xFc4a48 and reported under $50 in takings so far. Developers and users should follow the mitigation steps above. Published by COINOTAG on 2025-09-08. Update: 2025-09-08.


Don't forget to enable notifications for our Twitter account and Telegram channel to stay informed about the latest cryptocurrency news.

BREAKING NEWS

Bitcoin Liquidation Alert on CEXs: $1.226B Shorts at $114K vs $1.603B Longs at $110K

The latest Coinglass data indicates that if Bitcoin breaches...

Bitcoin Nets 3,057 BTC Inflow to CEX in 24h — Kraken Leads, Binance Posts 832 BTC Outflow

COINOTAG (Sept 9) citing Coinglass data reports a 24-hour...

24,400 ETH Inflows to CEXs in 24 Hours: Binance Leads with 13,100 ETH, Bitfinex & Bybit Follow; Gemini Tops Outflows

COINOTAG reported on September 9, citing Coinglass data that...

Ethereum Liquidation Shock: Coinglass Warns $709M Shorts at $4,400 vs $1.96B Longs if Price Falls Below $4,200

Ethereum short liquidation metrics from Coinglass indicate that a...

MYX Suffers $46.89M in 24-Hour Liquidations, Leading Crypto Market — Coinglass

According to Coinglass data on September 9, the MYX...
spot_imgspot_imgspot_img

Related Articles

spot_imgspot_imgspot_imgspot_img

Popular Categories

spot_imgspot_imgspot_img