The post Ledger CTO Warns Crypto Users at Risk from Billion-Download NPM Hack appeared on BitcoinEthereumNews.com. Key Takeaways In the latest NPM hack, attackers inject crypto-stealing malware into core NPM libraries. The malware silently intercepts web and wallet activity, cleverly swapping or hijacking victims’ crypto addresses using advanced string similarity algorithms. Ledger CTO Charles Guillemet warns that crypto users are especially vulnerable. Crypto’s latest security shock, the NPM hack, arrived courtesy of a single phishing email, which compromised a reputable developer’s NPM account. It has turned some of the most popular JavaScript libraries into silent crypto siphons practically overnight. Ledger CTO Charles Guillemet immediately took to X to warn crypto users to be vigilant. The NPM Hack: What Happened? NPM tools are packages that are woven into the heart of the internet, downloaded billions of times every year. If you’re building a wallet app, a crypto portfolio tracker, or even just a slick front end, odds are they’re somewhere in your software stack. And for the millions who rely on these libraries through DeFi platforms, exchanges, and even hardware wallet integrations, this breach is about as close to “everywhere” as software vulnerabilities get. So what happened in this NPM hack? It’s a story that feels as old as time. A reputable NPM maintainer fell victim to a targeted phishing campaign. Hackers tricked the developer into handing over two-factor authentication details via a fake NPM support email. Then, the bad actors used those credentials to push new, malicious versions of some of the ecosystem’s most widely used packages. From the outside, everything looked normal, with the same trusted packages and expected functionality. However, under the hood, it was a different story. These poisoned updates contain malware so sly it can read, rewrite, and reroute crypto transactions in real-time. A Closer Look into the Hack The code works by quietly monitoring wallet activity like browser-based requests, wallet app… The post Ledger CTO Warns Crypto Users at Risk from Billion-Download NPM Hack appeared on BitcoinEthereumNews.com. Key Takeaways In the latest NPM hack, attackers inject crypto-stealing malware into core NPM libraries. The malware silently intercepts web and wallet activity, cleverly swapping or hijacking victims’ crypto addresses using advanced string similarity algorithms. Ledger CTO Charles Guillemet warns that crypto users are especially vulnerable. Crypto’s latest security shock, the NPM hack, arrived courtesy of a single phishing email, which compromised a reputable developer’s NPM account. It has turned some of the most popular JavaScript libraries into silent crypto siphons practically overnight. Ledger CTO Charles Guillemet immediately took to X to warn crypto users to be vigilant. The NPM Hack: What Happened? NPM tools are packages that are woven into the heart of the internet, downloaded billions of times every year. If you’re building a wallet app, a crypto portfolio tracker, or even just a slick front end, odds are they’re somewhere in your software stack. And for the millions who rely on these libraries through DeFi platforms, exchanges, and even hardware wallet integrations, this breach is about as close to “everywhere” as software vulnerabilities get. So what happened in this NPM hack? It’s a story that feels as old as time. A reputable NPM maintainer fell victim to a targeted phishing campaign. Hackers tricked the developer into handing over two-factor authentication details via a fake NPM support email. Then, the bad actors used those credentials to push new, malicious versions of some of the ecosystem’s most widely used packages. From the outside, everything looked normal, with the same trusted packages and expected functionality. However, under the hood, it was a different story. These poisoned updates contain malware so sly it can read, rewrite, and reroute crypto transactions in real-time. A Closer Look into the Hack The code works by quietly monitoring wallet activity like browser-based requests, wallet app…

Ledger CTO Warns Crypto Users at Risk from Billion-Download NPM Hack

Key Takeaways

  • In the latest NPM hack, attackers inject crypto-stealing malware into core NPM libraries.
  • The malware silently intercepts web and wallet activity, cleverly swapping or hijacking victims’ crypto addresses using advanced string similarity algorithms.
  • Ledger CTO Charles Guillemet warns that crypto users are especially vulnerable.

Crypto’s latest security shock, the NPM hack, arrived courtesy of a single phishing email, which compromised a reputable developer’s NPM account. It has turned some of the most popular JavaScript libraries into silent crypto siphons practically overnight.

Ledger CTO Charles Guillemet immediately took to X to warn crypto users to be vigilant.

The NPM Hack: What Happened?

NPM tools are packages that are woven into the heart of the internet, downloaded billions of times every year. If you’re building a wallet app, a crypto portfolio tracker, or even just a slick front end, odds are they’re somewhere in your software stack.

And for the millions who rely on these libraries through DeFi platforms, exchanges, and even hardware wallet integrations, this breach is about as close to “everywhere” as software vulnerabilities get.

So what happened in this NPM hack? It’s a story that feels as old as time. A reputable NPM maintainer fell victim to a targeted phishing campaign.

Hackers tricked the developer into handing over two-factor authentication details via a fake NPM support email. Then, the bad actors used those credentials to push new, malicious versions of some of the ecosystem’s most widely used packages.

From the outside, everything looked normal, with the same trusted packages and expected functionality. However, under the hood, it was a different story.

These poisoned updates contain malware so sly it can read, rewrite, and reroute crypto transactions in real-time.

A Closer Look into the Hack

The code works by quietly monitoring wallet activity like browser-based requests, wallet app calls, and even direct API communications. It then swaps out crypto destination addresses with those belonging to the attacker.

As Guillemet put it in his public warning: “The malicious payload works by silently swapping crypto addresses on the fly to steal funds.”

Meanwhile, users who think they are sending tokens to a trusted friend or a reputable exchange now risk having their funds siphoned directly to a hostile wallet. No red flags, no obvious errors, and in the spirit of crypto, no second chances.

Advanced string matching algorithms even make the malicious addresses look alarmingly similar to legitimate ones, a trick designed to brush aside cursory visual checks. This update from the NPM hack has spooked traders, with experts urging caution.

Why the Ledger CTO Is Sounding the Alarm after NPM Hack?

Ledger didn’t just wade into this mess because it’s a leader in hardware wallets. Its CTO, Charles Guillemet, flagged the attack as an urgent risk for anyone conducting on-chain business.

NPM Hack Warning | Source: Charles Guillemet, X

Why so stark? Hardware wallets, designed to display and verify transaction details independently from compromised computers or browsers, offer a last line of defense.

Outside code can’t tamper with transactions shown on a Ledger, even if malicious scripts infest a PC. Verify the address, confirm the amount; it’s the ultimate crypto checkpoint.

For software wallet users, the picture is murkier. Malware injected during the NPM hack can hijack the UI, swap addresses, and even alter what the app displays. It makes it almost impossible to be certain the transaction is safe.

Until patches are out and the security teams sweep up the mess, the Ledger CTO advises refraining from transacting. This is one storm better waited out.

Why Crypto Is So Exposed?

This NPM hack is hardly the first time crypto’s digital plumbing turned out to be a vulnerability. SushiSwap’s MISO platform suffered a $3 million theft due to a supply-chain code commit in 2021.

In 2023, the infamous 3CX hack used supply chain tactics to target crypto companies across industries, with attackers leveraging trojaned installers to steal digital assets at scale.

Even government agencies have learned the hard way: supply chain attacks are as much about trust as they are about code, and in crypto, trust evaporates quickly.

Even as security teams work to purge infected packages from the NPM hack, the reality is clear: any open-source dependency is a potential Trojan horse.

Source: https://www.thecoinrepublic.com/2025/09/09/ledger-cto-warns-crypto-users-at-risk-from-billion-download-npm-hack/

Market Opportunity
RealLink Logo
RealLink Price(REAL)
$0.07881
$0.07881$0.07881
-0.51%
USD
RealLink (REAL) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Microsoft Corp. $MSFT blue box area offers a buying opportunity

Microsoft Corp. $MSFT blue box area offers a buying opportunity

The post Microsoft Corp. $MSFT blue box area offers a buying opportunity appeared on BitcoinEthereumNews.com. In today’s article, we’ll examine the recent performance of Microsoft Corp. ($MSFT) through the lens of Elliott Wave Theory. We’ll review how the rally from the April 07, 2025 low unfolded as a 5-wave impulse followed by a 3-swing correction (ABC) and discuss our forecast for the next move. Let’s dive into the structure and expectations for this stock. Five wave impulse structure + ABC + WXY correction $MSFT 8H Elliott Wave chart 9.04.2025 In the 8-hour Elliott Wave count from Sep 04, 2025, we saw that $MSFT completed a 5-wave impulsive cycle at red III. As expected, this initial wave prompted a pullback. We anticipated this pullback to unfold in 3 swings and find buyers in the equal legs area between $497.02 and $471.06 This setup aligns with a typical Elliott Wave correction pattern (ABC), in which the market pauses briefly before resuming its primary trend. $MSFT 8H Elliott Wave chart 7.14.2025 The update, 10 days later, shows the stock finding support from the equal legs area as predicted allowing traders to get risk free. The stock is expected to bounce towards 525 – 532 before deciding if the bounce is a connector or the next leg higher. A break into new ATHs will confirm the latter and can see it trade higher towards 570 – 593 area. Until then, traders should get risk free and protect their capital in case of a WXY double correction. Conclusion In conclusion, our Elliott Wave analysis of Microsoft Corp. ($MSFT) suggested that it remains supported against April 07, 2025 lows and bounce from the blue box area. In the meantime, keep an eye out for any corrective pullbacks that may offer entry opportunities. By applying Elliott Wave Theory, traders can better anticipate the structure of upcoming moves and enhance risk management in volatile markets. Source: https://www.fxstreet.com/news/microsoft-corp-msft-blue-box-area-offers-a-buying-opportunity-202509171323
Share
BitcoinEthereumNews2025/09/18 03:50
IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

The post IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge! appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 18:00 Discover why BlockDAG’s upcoming Awakening Testnet launch makes it the best crypto to buy today as Story (IP) price jumps to $11.75 and Hyperliquid hits new highs. Recent crypto market numbers show strength but also some limits. The Story (IP) price jump has been sharp, fueled by big buybacks and speculation, yet critics point out that revenue still lags far behind its valuation. The Hyperliquid (HYPE) price looks solid around the mid-$50s after a new all-time high, but questions remain about sustainability once the hype around USDH proposals cools down. So the obvious question is: why chase coins that are either stretched thin or at risk of retracing when you could back a network that’s already proving itself on the ground? That’s where BlockDAG comes in. While other chains are stuck dealing with validator congestion or outages, BlockDAG’s upcoming Awakening Testnet will be stress-testing its EVM-compatible smart chain with real miners before listing. For anyone looking for the best crypto coin to buy, the choice between waiting on fixes or joining live progress feels like an easy one. BlockDAG: Smart Chain Running Before Launch Ethereum continues to wrestle with gas congestion, and Solana is still known for network freezes, yet BlockDAG is already showing a different picture. Its upcoming Awakening Testnet, set to launch on September 25, isn’t just a demo; it’s a live rollout where the chain’s base protocols are being stress-tested with miners connected globally. EVM compatibility is active, account abstraction is built in, and tools like updated vesting contracts and Stratum integration are already functional. Instead of waiting for fixes like other networks, BlockDAG is proving its infrastructure in real time. What makes this even more important is that the technology is operational before the coin even hits exchanges. That…
Share
BitcoinEthereumNews2025/09/18 00:32
Zero Knowledge Proof Sparks 300x Growth Discussion! Bitcoin Cash & Ethereum Cool Off

Zero Knowledge Proof Sparks 300x Growth Discussion! Bitcoin Cash & Ethereum Cool Off

Explore how Bitcoin Cash and Ethereum move sideways while Zero Knowledge Proof (ZKP) gains notice with a live presale auction, working infra, shipping Proof Pods
Share
CoinLive2026/01/18 07:00