The post Your Wallet Funds Are Now at Risk appeared on BitcoinEthereumNews.com. A major cyberattack has shaken the global software ecosystem and placed millions of crypto users at risk. Hackers hijacked a popular developer’s account on npm, the platform that powers much of the web, and slipped malicious updates into widely used code libraries. These libraries are buried deep inside countless apps and websites. Together, they are downloaded more than a billion times each week. That scale makes this one of the largest software supply-chain compromises ever seen. A New Malware Targeting Crypto Transactions Sponsored The malicious code targets cryptocurrency transactions. It works in two ways. First, if no wallet is detected, the malware looks for crypto addresses inside a website and replaces them with attacker-controlled addresses.  It uses clever tricks to swap them for look-alikes that are visually almost identical. This makes it easy for users to miss the switch. DO NOT USE YOUR CRYPTO WALLET unless you know for sure it is not affected by the NPM Javascript Hack. From the code I reviewed, it looks like it targets browser based wallets like metamask by intercepting the browser’s methods like fetch and XMLHttpRequest. The code chooses… — Scott Emick 🇺🇸 (@semick) September 8, 2025 Second, if a wallet like MetaMask is present, the code actively changes transactions.  When a user prepares to send funds, the malware intercepts the data and replaces the recipient with the attacker’s address. If the user signs without carefully checking, their money is gone. Sponsored Every Crypto User Could Be At Risk The attack began when the npm account of the developer known as Qix was compromised. Hackers then published new versions of dozens of his packages, including the core utilities mentioned above. Developers who updated their projects pulled in these poisoned versions automatically. Any website or decentralized application that deployed them could unknowingly expose their… The post Your Wallet Funds Are Now at Risk appeared on BitcoinEthereumNews.com. A major cyberattack has shaken the global software ecosystem and placed millions of crypto users at risk. Hackers hijacked a popular developer’s account on npm, the platform that powers much of the web, and slipped malicious updates into widely used code libraries. These libraries are buried deep inside countless apps and websites. Together, they are downloaded more than a billion times each week. That scale makes this one of the largest software supply-chain compromises ever seen. A New Malware Targeting Crypto Transactions Sponsored The malicious code targets cryptocurrency transactions. It works in two ways. First, if no wallet is detected, the malware looks for crypto addresses inside a website and replaces them with attacker-controlled addresses.  It uses clever tricks to swap them for look-alikes that are visually almost identical. This makes it easy for users to miss the switch. DO NOT USE YOUR CRYPTO WALLET unless you know for sure it is not affected by the NPM Javascript Hack. From the code I reviewed, it looks like it targets browser based wallets like metamask by intercepting the browser’s methods like fetch and XMLHttpRequest. The code chooses… — Scott Emick 🇺🇸 (@semick) September 8, 2025 Second, if a wallet like MetaMask is present, the code actively changes transactions.  When a user prepares to send funds, the malware intercepts the data and replaces the recipient with the attacker’s address. If the user signs without carefully checking, their money is gone. Sponsored Every Crypto User Could Be At Risk The attack began when the npm account of the developer known as Qix was compromised. Hackers then published new versions of dozens of his packages, including the core utilities mentioned above. Developers who updated their projects pulled in these poisoned versions automatically. Any website or decentralized application that deployed them could unknowingly expose their…

Your Wallet Funds Are Now at Risk

2025/09/09 07:33
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

A major cyberattack has shaken the global software ecosystem and placed millions of crypto users at risk. Hackers hijacked a popular developer’s account on npm, the platform that powers much of the web, and slipped malicious updates into widely used code libraries.

These libraries are buried deep inside countless apps and websites. Together, they are downloaded more than a billion times each week. That scale makes this one of the largest software supply-chain compromises ever seen.

A New Malware Targeting Crypto Transactions

Sponsored

The malicious code targets cryptocurrency transactions. It works in two ways.

First, if no wallet is detected, the malware looks for crypto addresses inside a website and replaces them with attacker-controlled addresses. 

It uses clever tricks to swap them for look-alikes that are visually almost identical. This makes it easy for users to miss the switch.

Second, if a wallet like MetaMask is present, the code actively changes transactions. 

When a user prepares to send funds, the malware intercepts the data and replaces the recipient with the attacker’s address. If the user signs without carefully checking, their money is gone.

Sponsored

Every Crypto User Could Be At Risk

The attack began when the npm account of the developer known as Qix was compromised. Hackers then published new versions of dozens of his packages, including the core utilities mentioned above.

Developers who updated their projects pulled in these poisoned versions automatically. Any website or decentralized application that deployed them could unknowingly expose their users.

The breach was uncovered only after a build error drew attention to strange, unreadable code inside one of the updated packages. 

Sponsored

Security experts later found it was a sophisticated “crypto-clipper” designed to silently redirect funds.

The threat is especially serious for anyone making transactions through a web browser. If you copied an address from a site, or if you signed a transfer without checking, you could be at risk.

Ledger’s Chief Technology Officer issued a stark warning on social media.

What You Should Do Now

Sponsored

Experts recommend several urgent steps for all crypto holders:

  • Verify addresses: Always read the full address on your wallet’s confirmation screen or hardware device before signing.
  • Pause activity if unsure: If you use a browser-based or software wallet, consider holding off on transactions until more is known.
  • Check recent activity: Review past transfers and approvals. If you see anything suspicious, revoke approvals and move funds to a new wallet.
  • Use test transactions: When sending to a new address, transfer a small amount first to confirm it arrives safely.
  • Rely on hardware wallets: Devices that show transaction details on a separate screen remain the most secure option.

Sponsored

The attack shows how fragile trust in the open-source software ecosystem can be. A single compromised developer account allowed hackers to push dangerous code into billions of downloads.

This incident is still unfolding. The malicious versions are being removed, but some may remain online for days or weeks. The safest approach is vigilance.

If you use crypto, check every transaction with care. One extra look at the address on your wallet could be the difference between safety and theft.

Source: https://beincrypto.com/major-crypto-hack-warning-wallets-at-risk/

시장 기회
Moonveil 로고
Moonveil 가격(MORE)
$0.00003976
$0.00003976$0.00003976
+1.45%
USD
Moonveil (MORE) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!