The post Crypto Funds at Risk from Massive Supply Chain Attack appeared on BitcoinEthereumNews.com. Crypto Hack: What Happened? A widely used npm package, error-ex, was tampered with in its 1.3.3 release. Hidden inside was obfuscated code that activates two dangerous attack modes: Clipboard Hijacking: When you paste a wallet address, the malware silently swaps it with the attacker’s lookalike address. Transaction Interception: If you use a browser wallet, the code can intercept transaction calls and change the recipient’s address before you even see the confirmation screen. This makes it nearly impossible to notice unless you carefully check every single character of the address you’re sending to. Who’s at Risk from this Crypto Hack? Developers: Any project pulling dependencies without strict version pinning may have installed the infected version. This could affect CI pipelines, production builds, and apps that rely on JavaScript. Crypto Users: The malware targets major assets including $BTC, $ETH, $SOL, $TRX, $LTC, and $BCH. Both clipboard users and browser wallets are at risk. Platforms: Even centralized apps integrating npm libraries may have unknowingly included the malicious code. Which Companies were Affected? Already, SwissBorg confirmed a breach linked to a compromised partner API. Roughly 192.6K SOL (~$41.5M) was drained in the attack. While the SwissBorg app itself remains secure, its SOL Earn Program was hit, affecting <1% of users. The platform has promised recovery measures, including treasury funds and support from white-hat hackers. How to Protect Yourself Here’s what you need to do right now: For Wallet Users ✅ Always verify every transaction — check the full recipient address before signing.✅ Use a hardware wallet with clear signing enabled.✅ Avoid unnecessary browser wallet extensions.✅ If something feels off (unexpected signing requests), close the tab immediately. For Developers ⚙️ Switch CI builds from npm install to npm ci to lock dependencies.⚙️ Run npm ls error-ex to detect infected installs.⚙️ Pin safe versions (error-ex@1.3.2) and… The post Crypto Funds at Risk from Massive Supply Chain Attack appeared on BitcoinEthereumNews.com. Crypto Hack: What Happened? A widely used npm package, error-ex, was tampered with in its 1.3.3 release. Hidden inside was obfuscated code that activates two dangerous attack modes: Clipboard Hijacking: When you paste a wallet address, the malware silently swaps it with the attacker’s lookalike address. Transaction Interception: If you use a browser wallet, the code can intercept transaction calls and change the recipient’s address before you even see the confirmation screen. This makes it nearly impossible to notice unless you carefully check every single character of the address you’re sending to. Who’s at Risk from this Crypto Hack? Developers: Any project pulling dependencies without strict version pinning may have installed the infected version. This could affect CI pipelines, production builds, and apps that rely on JavaScript. Crypto Users: The malware targets major assets including $BTC, $ETH, $SOL, $TRX, $LTC, and $BCH. Both clipboard users and browser wallets are at risk. Platforms: Even centralized apps integrating npm libraries may have unknowingly included the malicious code. Which Companies were Affected? Already, SwissBorg confirmed a breach linked to a compromised partner API. Roughly 192.6K SOL (~$41.5M) was drained in the attack. While the SwissBorg app itself remains secure, its SOL Earn Program was hit, affecting <1% of users. The platform has promised recovery measures, including treasury funds and support from white-hat hackers. How to Protect Yourself Here’s what you need to do right now: For Wallet Users ✅ Always verify every transaction — check the full recipient address before signing.✅ Use a hardware wallet with clear signing enabled.✅ Avoid unnecessary browser wallet extensions.✅ If something feels off (unexpected signing requests), close the tab immediately. For Developers ⚙️ Switch CI builds from npm install to npm ci to lock dependencies.⚙️ Run npm ls error-ex to detect infected installs.⚙️ Pin safe versions (error-ex@1.3.2) and…

Crypto Funds at Risk from Massive Supply Chain Attack

2025/09/09 06:06
2분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

Crypto Hack: What Happened?

A widely used npm package, error-ex, was tampered with in its 1.3.3 release. Hidden inside was obfuscated code that activates two dangerous attack modes:

  • Clipboard Hijacking: When you paste a wallet address, the malware silently swaps it with the attacker’s lookalike address.
  • Transaction Interception: If you use a browser wallet, the code can intercept transaction calls and change the recipient’s address before you even see the confirmation screen.

This makes it nearly impossible to notice unless you carefully check every single character of the address you’re sending to.

Who’s at Risk from this Crypto Hack?

  1. Developers: Any project pulling dependencies without strict version pinning may have installed the infected version. This could affect CI pipelines, production builds, and apps that rely on JavaScript.
  2. Crypto Users: The malware targets major assets including $BTC, $ETH, $SOL, $TRX, $LTC, and $BCH. Both clipboard users and browser wallets are at risk.
  3. Platforms: Even centralized apps integrating npm libraries may have unknowingly included the malicious code.

Which Companies were Affected?

Already, SwissBorg confirmed a breach linked to a compromised partner API. Roughly 192.6K SOL (~$41.5M) was drained in the attack. While the SwissBorg app itself remains secure, its SOL Earn Program was hit, affecting <1% of users. The platform has promised recovery measures, including treasury funds and support from white-hat hackers.

How to Protect Yourself

Here’s what you need to do right now:

For Wallet Users

✅ Always verify every transaction — check the full recipient address before signing.
✅ Use a hardware wallet with clear signing enabled.
✅ Avoid unnecessary browser wallet extensions.
✅ If something feels off (unexpected signing requests), close the tab immediately.

For Developers

⚙️ Switch CI builds from npm install to npm ci to lock dependencies.
⚙️ Run npm ls error-ex to detect infected installs.
⚙️ Pin safe versions ([email protected]) and regenerate lockfiles.
⚙️ Add dependency scanners like Snyk or Dependabot.
⚙️ Treat package-lock changes with the same scrutiny as code reviews.

Outlook

This incident highlights the fragility of supply chains in Web3 and beyond. A small package compromise can cascade into billions of downloads, hitting both developers and crypto holders worldwide. The immediate danger lies in address-swapping attacks, but the broader concern is how deep this could spread into financial infrastructure.

For now: check before you sign, pin your dependencies, and don’t take security shortcuts.

Source: https://cryptoticker.io/en/breaking-massive-supply-chain-attack-hits-crypto-funds-at-risk/

시장 기회
비트코인 캐시 노드 로고
비트코인 캐시 노드 가격(BCH)
$445
$445$445
+0.49%
USD
비트코인 캐시 노드 (BCH) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!