The post over 1 billion downloads exposed in the NPM attack appeared on BitcoinEthereumNews.com. The CTO of Ledger, Charles Guillemet, reported on X a supply chain attack involving widely used NPM packages.  🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk. The malicious payload works… — Charles Guillemet (@P3b7_) September 8, 2025 According to a report by CoinDesk, some compromised versions – totaling over 1 billion downloads – include code capable of replacing, “on the fly,” destination addresses in crypto transactions, redirecting funds to wallets controlled by attackers. This scenario aligns with supply chain protection recommendations published by industry organizations like OWASP, which highlight how supply chain compromises can have large-scale impacts. According to the data collected by our threat intelligence team in the last 24 hours, indicators of compromise have emerged consistent with the technique described in multiple repositories and build pipelines. Analysts we collaborate with also emphasize that the scope of the incident is amplified by transitive dependencies and the size of the registry: the NPM registry hosts over 2 million packages, increasing the likelihood of propagation of a compromised module. Attack Mechanism: Addresses Changed “On the Fly” That said, the malicious payload activates both during on-chain operations and at the moment of transaction generation or signing. In practice, the malware intercepts the recipient address and replaces it with one belonging to the malicious actors. The user, seeing an apparently “clean” screen, might not realize that the final transaction sends the funds to a different address – a dynamic also confirmed by The Block. It should be noted that the manipulation is aimed at remaining invisible until the last confirmation step. Update on the NPM attack: The attack fortunately failed, with almost… The post over 1 billion downloads exposed in the NPM attack appeared on BitcoinEthereumNews.com. The CTO of Ledger, Charles Guillemet, reported on X a supply chain attack involving widely used NPM packages.  🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk. The malicious payload works… — Charles Guillemet (@P3b7_) September 8, 2025 According to a report by CoinDesk, some compromised versions – totaling over 1 billion downloads – include code capable of replacing, “on the fly,” destination addresses in crypto transactions, redirecting funds to wallets controlled by attackers. This scenario aligns with supply chain protection recommendations published by industry organizations like OWASP, which highlight how supply chain compromises can have large-scale impacts. According to the data collected by our threat intelligence team in the last 24 hours, indicators of compromise have emerged consistent with the technique described in multiple repositories and build pipelines. Analysts we collaborate with also emphasize that the scope of the incident is amplified by transitive dependencies and the size of the registry: the NPM registry hosts over 2 million packages, increasing the likelihood of propagation of a compromised module. Attack Mechanism: Addresses Changed “On the Fly” That said, the malicious payload activates both during on-chain operations and at the moment of transaction generation or signing. In practice, the malware intercepts the recipient address and replaces it with one belonging to the malicious actors. The user, seeing an apparently “clean” screen, might not realize that the final transaction sends the funds to a different address – a dynamic also confirmed by The Block. It should be noted that the manipulation is aimed at remaining invisible until the last confirmation step. Update on the NPM attack: The attack fortunately failed, with almost…

over 1 billion downloads exposed in the NPM attack

The CTO of Ledger, Charles Guillemet, reported on X a supply chain attack involving widely used NPM packages. 

According to a report by CoinDesk, some compromised versions – totaling over 1 billion downloads – include code capable of replacing, “on the fly,” destination addresses in crypto transactions, redirecting funds to wallets controlled by attackers. This scenario aligns with supply chain protection recommendations published by industry organizations like OWASP, which highlight how supply chain compromises can have large-scale impacts.

According to the data collected by our threat intelligence team in the last 24 hours, indicators of compromise have emerged consistent with the technique described in multiple repositories and build pipelines. Analysts we collaborate with also emphasize that the scope of the incident is amplified by transitive dependencies and the size of the registry: the NPM registry hosts over 2 million packages, increasing the likelihood of propagation of a compromised module.

Attack Mechanism: Addresses Changed “On the Fly”

That said, the malicious payload activates both during on-chain operations and at the moment of transaction generation or signing. In practice, the malware intercepts the recipient address and replaces it with one belonging to the malicious actors. The user, seeing an apparently “clean” screen, might not realize that the final transaction sends the funds to a different address – a dynamic also confirmed by The Block. It should be noted that the manipulation is aimed at remaining invisible until the last confirmation step.

Involved packages: numbers, provisional names, and distribution

Initial analyses indicate that the compromise occurred by exploiting the account of a maintainer with access to widely used libraries. Among the names circulated is, for example, the package error-ex – whose official profile can be viewed on npmjs.com – although the official lists are still being updated. The impact is amplified by the cascading effect due to dependencies: a single compromised module can spread to hundreds of projects, thanks to import chains. Indeed, the modular nature of JavaScript code makes it easier for the problem to spread when dependencies are deeply nested.

  • Exposure scale: over 1 billion cumulative downloads of potentially at-risk versions.
  • Vector: publications on NPM through stolen credentials or compromised pipeline.
  • Scope: core libraries used in web projects and wallets.

The official lists of affected packages and versions are partial; it is advisable to monitor NPM advisories and maintainer repositories. However, until definitive communications are made, it remains prudent to consider the entire dependency chain at risk.

Impact on users and businesses

  • Direct crypto theft following the sneaky replacement of the address.
  • Application integrity compromised in dApp, extensions, and desktop/web wallets.
  • Reputational risk for projects that integrate contaminated packages.

What to Do Immediately: Emergency Checklist

For end users (crypto)

  • Prefer wallets that clearly display transaction information (screen and clear signature – Clear Signing), verifying the address and amount on the device before confirming. For practical guidance, see our guide on checking hardware wallets.
  • Avoid blind signing and limit the use of unverified QR codes.
  • Compare the displayed address with a secure copy and use whitelists for frequent recipients.

This precaution is crucial because confirmation on a hardware wallet shows the data that is actually being signed, making any address substitution by the host software evident. In this context, verification on the device’s screen reduces the likelihood of error or upstream manipulation.

For development teams

  • Temporarily suspend automatic updates of critical dependencies.
  • Perform auditing and rollback of the versions published during the suspicious period.
  • Rotate NPM tokens and make 2FA activation mandatory for maintainers and releasers (see here).
  • Enable provenance systems for publications and sign build artifacts.

How to verify if a project is exposed

Quickly identifying suspicious dependencies and installed version ranges is crucial: timely reconnaissance limits the domino effect in pipelines.

# List installed versions and dependency chain

npm ls error-ex

# Check known vulnerabilities and advisories

npm audit –production

npm audit –json > audit.json

# Block non-deterministic updates in CI

npm ci –ignore-scripts

# Set a stricter audit threshold

npm config set audit-level=high

# Check available versions and publication dates

npm view error-ex versions –json

npm view error-ex time –json

In CI contexts, setting ignore-scripts=true helps reduce the risk of executing malicious post-install scripts. That said, it is advisable to establish a reproducible baseline right away to avoid unexpected deviations. For an extended checklist on CI verifications, refer to our page on supply chain best practices.

  • Use a deterministic lockfile (package-lock.json) and deploy with npm ci to ensure reproducibility.
  • Enable 2FA on NPM for publications and critical access, using tokens with limited scopes (automation vs. publish).
  • Implement mandatory code review and use an isolated CI pipeline with artifact signing.
  • Adopt provenance systems, referring to the official documentation on npm package provenance and standards like SLSA.
  • Use scanning tools and controlled updates, such as Dependabot, Renovate, and sigstore/cosign, where applicable.
  • Apply the principle of least privilege for the accounts of maintainers and release bots.

Timeline and Status of Investigations

The alert was made public today, September 8, 2025, and verifications are currently underway. Official advisories and updated lists of compromised packages and versions will be released progressively. Therefore, it is advisable to maintain a cautious approach, suspending non-essential updates until indicators of compromise are consolidated. Pending further feedback, the priority remains to contain exposure and carefully document every change.

Critical Angle: A Chain of Trust Still Fragile

The open source supply chain remains vulnerable when account access and publishing pipelines are not adequately protected. The issue becomes particularly pressing when, in 2025, numerous publications still occur without the systematic adoption of measures such as 2FA, provenance, and rigorous reviews. 

As long as trust is taken for granted, every project will continue to be exposed to the risk generated by others. Yet, even small improvements in processes can significantly reduce the attack surface.

The Point

This episode highlights how critical supply chain security is in open-source software. As long as investigations are ongoing, the priority will be to limit attack surfaces, carefully verify transaction data on screen, and consolidate publishing processes through the adoption of 2FA, lockfile, and provenance systems. 

The transparency of advisories, as noted by numerous experts, will be crucial in measuring the real impact and restoring trust in the ecosystem. In this context, adherence to best practices remains the only immediate safeguard.

Source: https://en.cryptonomist.ch/2025/09/09/npm-under-attack-compromised-javascript-packages-crypto-addresses-hijacked-warning-from-ledgers-cto-over-1-billion-downloads-exposed/

Market Opportunity
Fly Trade Logo
Fly Trade Price(FLY)
$0.01983
$0.01983$0.01983
-24.65%
USD
Fly Trade (FLY) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Mitosis Price Flashes a Massive Breakout Hope; Cup-And-Handle Pattern Signals MITO Targeting 50% Rally To $0.115305 Level

Mitosis Price Flashes a Massive Breakout Hope; Cup-And-Handle Pattern Signals MITO Targeting 50% Rally To $0.115305 Level

The analyst identified a formation of a cup-and-handle pattern on Mitosis’s chart, suggesting that MITO is preparing to see a looming price explosion.
Share
Blockchainreporter2026/01/18 09:00
Spot ETH ETFs Surge: Remarkable $48M Inflow Streak Continues

Spot ETH ETFs Surge: Remarkable $48M Inflow Streak Continues

BitcoinWorld Spot ETH ETFs Surge: Remarkable $48M Inflow Streak Continues The cryptocurrency world is buzzing with exciting news as Spot ETH ETFs continue to capture significant investor attention. For the second consecutive day, these innovative investment vehicles have seen substantial positive flows, reinforcing confidence in the Ethereum ecosystem. This consistent performance signals a growing appetite for regulated crypto exposure among traditional investors. What’s Fueling the Latest Spot ETH ETF Inflows? On September 19, U.S. Spot ETH ETFs collectively recorded a net inflow of an impressive $48 million. This marked another day of positive momentum, building on previous gains. Such figures are not just numbers; they represent tangible capital moving into the Ethereum market through accessible investment products. BlackRock’s ETHA Leads the Charge: A standout performer was BlackRock’s ETHA, which alone attracted a staggering $140 million in inflows. This substantial figure highlights the significant influence of major financial institutions in driving the adoption of crypto-backed ETFs. Institutional Confidence: The consistent inflows, particularly from prominent asset managers like BlackRock, suggest increasing institutional comfort and conviction in Ethereum’s long-term potential. Why Are Consecutive Spot ETH ETF Inflows So Significant? Two consecutive days of net inflows into Spot ETH ETFs are more than just a fleeting trend; they indicate a strengthening pattern of investor interest. This sustained positive movement suggests that initial hesitancy might be giving way to broader acceptance and strategic positioning within the digital asset space. Understanding the implications of these inflows is crucial: Market Validation: Continuous inflows serve as a strong validation for Ethereum as a legitimate and valuable asset class within traditional finance. Liquidity and Stability: Increased capital flowing into these ETFs can contribute to greater market liquidity and potentially enhance price stability for Ethereum itself, reducing volatility over time. Paving the Way: The success of Spot ETH ETFs could also pave the way for other cryptocurrency-based investment products, further integrating digital assets into mainstream financial portfolios. Are All Spot ETH ETFs Experiencing the Same Momentum? While the overall picture for Spot ETH ETFs is overwhelmingly positive, it’s important to note that individual fund performances can vary. The market is dynamic, and different funds may experience unique flow patterns based on investor preferences, fund structure, and underlying strategies. Mixed Performance: On the same day, Fidelity’s FETH saw net outflows of $53.4 million, and Grayscale’s Mini ETH recorded outflows of $11.3 million. Normal Market Fluctuations: These outflows, while notable, are a normal part of market dynamics. Investors might be rebalancing portfolios, taking profits, or shifting capital between different investment vehicles. The net positive inflow across the entire sector indicates that new money is still entering faster than it is leaving. This nuanced view helps us appreciate the complex interplay of forces shaping the market for Spot ETH ETFs. What’s Next for Spot ETH ETFs and the Ethereum Market? The sustained interest in Spot ETH ETFs suggests a potentially bright future for Ethereum’s integration into traditional financial markets. As more investors gain access to ETH through regulated products, the demand for the underlying asset could increase, influencing its price and overall market capitalization. For investors looking to navigate this evolving landscape, here are some actionable insights: Stay Informed: Keep an eye on daily inflow and outflow data, as these can provide early indicators of market sentiment. Understand Diversification: While Spot ETH ETFs offer exposure, remember the importance of a diversified investment portfolio. Monitor Regulatory Developments: The regulatory environment for cryptocurrencies is constantly evolving, which can impact the performance and availability of these investment products. Conclusion: A Promising Horizon for Ethereum The consistent positive net inflows into Spot ETH ETFs for a second straight day underscore a significant shift in how institutional and retail investors view Ethereum. This growing confidence, spearheaded by major players like BlackRock, signals a maturing market where digital assets are increasingly seen as viable components of a modern investment strategy. As the ecosystem continues to develop, these ETFs will likely play a crucial role in shaping Ethereum’s future trajectory and its broader acceptance in global finance. It’s an exciting time to watch the evolution of these groundbreaking financial instruments. Frequently Asked Questions (FAQs) Q1: What is a Spot ETH ETF? A Spot ETH ETF (Exchange-Traded Fund) is an investment product that directly holds Ethereum. It allows investors to gain exposure to Ethereum’s price movements without needing to buy, store, or manage the actual cryptocurrency themselves. Q2: Why are these recent inflows into Spot ETH ETFs important? The recent inflows signify growing institutional and retail investor confidence in Ethereum as an asset. Consistent positive flows can lead to increased market liquidity, potential price stability, and broader acceptance of cryptocurrencies in traditional financial portfolios. Q3: Which funds are leading the inflows for Spot ETH ETFs? On September 19, BlackRock’s ETHA led the group with a substantial $140 million in inflows, demonstrating strong interest from a major financial institution. Q4: Do all Spot ETH ETFs experience inflows simultaneously? No, not all Spot ETH ETFs experience inflows at the same time. While the overall sector may see net positive flows, individual funds like Fidelity’s FETH and Grayscale’s Mini ETH can experience outflows due to various factors such as rebalancing or profit-taking by investors. Q5: What does the success of Spot ETH ETFs mean for Ethereum’s price? Increased demand through Spot ETH ETFs can potentially drive up the price of Ethereum by increasing buying pressure on the underlying asset. However, numerous factors influence crypto prices, so it’s not a guaranteed outcome. If you found this article insightful, consider sharing it with your network! Your support helps us continue to provide valuable insights into the dynamic world of cryptocurrency. Spread the word and help others understand the exciting developments in Spot ETH ETFs! To learn more about the latest crypto market trends, explore our article on key developments shaping Ethereum institutional adoption. This post Spot ETH ETFs Surge: Remarkable $48M Inflow Streak Continues first appeared on BitcoinWorld.
Share
Coinstats2025/09/20 11:10
Trump imposes 10% tariffs on eight European countries over Greenland.

Trump imposes 10% tariffs on eight European countries over Greenland.

PANews reported on January 18th that, according to Jinshi News, on January 17th local time, US President Trump announced via social media that, due to the Greenland
Share
PANews2026/01/18 08:46