Hackers Hijack 18 Popular npm Packages with 2B Weekly Downloads

Cybercriminals have executed a sophisticated supply chain attack against 18 highly popular npm packages, affecting billions of weekly downloads and specifically targeting cryptocurrency users and developers.

The breach, discovered represents one of the most significant package repository compromises in recent history, demonstrating the vulnerability of open-source ecosystems to coordinated attacks.

Malware Injection Targets Development Infrastructure

The compromised packages include essential development tools such as chalk, debug, chalk-template, ansi-styles, and supports-color—libraries fundamental to millions of applications worldwide.

These packages serve as backbone infrastructure for development environments, handling critical functions like logging, color output, text processing, and debugging operations.

The attackers strategically selected packages with massive distribution reach, with individual packages like debug and chalk each recording hundreds of millions of weekly downloads.

The malicious code injection specifically targets cryptocurrency operations by hooking into critical browser APIs, including fetch, XMLHttpRequest, and wallet interfaces such as window.ethereum and Solana protocols.

The malware operates stealthily, scanning web traffic and content for cryptocurrency wallet addresses and payment requests across multiple blockchain networks.

When users interact with their digital wallets—whether handling Ethereum, Bitcoin, Solana, Tron, Litecoin, or Bitcoin Cash transactions—the malware silently substitutes legitimate destination addresses with attacker-controlled wallets using visually similar addresses.

Sophisticated Attack Vector and Ongoing Response

The initial compromise originated from a carefully orchestrated phishing campaign targeting package maintainers.

Attackers sent deceptive emails from domains designed to impersonate official npm support channels, successfully obtaining authentication credentials from unsuspecting maintainers.

Following the initial breach, the attackers systematically expanded their access by targeting additional maintainers of other widely-used projects, amplifying the attack’s scope and impact.

The malware’s sophisticated design includes transaction hijacking capabilities that alter signing parameters during execution, ensuring that transfers, approvals, and allowances are redirected to attacker-controlled addresses while maintaining normal user interface appearance.

Detection proves extremely challenging due to the malware’s reliance on obfuscated code and lookalike addresses that closely resemble legitimate cryptocurrency addresses.

Security researchers and package maintainers responded rapidly to contain the breach, though some packages like simple-swizzle remained compromised for hours after initial detection.

This incident underscores the critical supply chain risks inherent in popular open-source ecosystems, where a single compromise can cascade across millions of dependent applications.

Package NameWeekly DownloadsCompromise StatusPrimary Function
chalk299.99mCompromisedTerminal color styling
debug357.6mCompromisedDebugging utility
ansi-styles371.41mCompromisedANSI styling codes
strip-ansi261.17mCompromisedANSI code removal
chalk-template3.9mCompromisedTemplate string coloring
supports-color195m+CompromisedColor support detection

Organizations and developers are strongly advised to implement automated dependency validation tools, avoid compromised package versions, and establish rigorous security protocols for cryptocurrency-handling applications to prevent similar supply chain exploitation.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here