
{"id":95178,"date":"2025-09-09T22:03:31","date_gmt":"2025-09-09T22:03:31","guid":{"rendered":"https:\/\/mycryptomania.com\/?p=95178"},"modified":"2025-09-09T22:03:31","modified_gmt":"2025-09-09T22:03:31","slug":"crypto-stealing-malware-infiltrates-core-javascript-libraries-used-by-millions","status":"publish","type":"post","link":"https:\/\/mycryptomania.com\/?p=95178","title":{"rendered":"Crypto-Stealing Malware Infiltrates Core JavaScript Libraries Used by Millions"},"content":{"rendered":"<p>The NPM (node packet manager) account of developer \u2018qix\u2019 was compromised, allowing hackers to publish malicious versions of his packages.<\/p>\n<p>The <a href=\"https:\/\/cryptopotato.com\/lazarus-group-evolves-tactics-to-target-cefi-job-seekers-with-clickfix-malware\/\">attackers <\/a>published malicious versions of dozens of extremely popular JavaScript packages, including fundamental utilities. The hack was massive in scope since the affected packages have over 1 billion combined weekly downloads.<\/p>\n<p>This attack on the software supply chain specifically targets the JavaScript\/Node.js ecosystem.<\/p>\n<p>NPM Supply Chain Attack<\/p>\n<p>Popular dev qix fell victim to phishing. Malicious code injected into npm packages now hijacks crypto transactions at signing.<\/p>\n<p>Attack method:<br \/>\n\u2022 Hooks wallet functions (request\/send)<br \/>\n\u2022 Swaps recipient addresses in ETH\/SOL transactions<br \/>\n\u2022 Replaces\u2026 <a href=\"https:\/\/t.co\/Jn9H4HWP8v\" target=\"_blank\" rel=\"noopener\">pic.twitter.com\/Jn9H4HWP8v<\/a><\/p>\n<p>\u2014 Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) <a href=\"https:\/\/twitter.com\/realScamSniffer\/status\/1965183460269850745?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 8, 2025<\/a><\/p>\n\n<h2>Crypto Clipper Malware<\/h2>\n<p>The malicious code was a \u201ccrypto-clipper\u201d designed to steal cryptocurrency by swapping wallet addresses in network requests and hijacking crypto transactions directly. It was also heavily obfuscated to avoid detection.<\/p>\n<p>The crypto-stealing <a href=\"https:\/\/cryptopotato.com\/telegram-malware-scams-surge-2000-overtaking-phishing-attacks\/\">malware<\/a> has two attack vectors. When no crypto wallet extension is found, the malware intercepts all network traffic by replacing the browser\u2019s native fetch and HTTP request functions with extensive lists of attacker-owned wallet addresses.<\/p>\n<p>Using sophisticated address swapping, it employs algorithms to find replacement addresses that look visually similar to legitimate ones, making the fraud nearly impossible to spot with the naked eye, <a href=\"https:\/\/jdstaerk.substack.com\/p\/we-just-found-malicious-code-in-the\" target=\"_blank\" rel=\"noopener\">said<\/a> cybersecurity researchers.<\/p>\n<p>If a crypto wallet is found, the malware intercepts transactions before signing, and when users initiate transactions, it modifies them in memory to redirect funds to attacker addresses.<\/p>\n<p>The attack targeted packages such as \u2018chalk,\u2019 \u2018strip-ansi,\u2019 \u2018color-convert,\u2019 and \u2018color-name,\u2019 which are core building blocks buried deep in the dependency trees of countless projects.<\/p>\n<p>The attack was discovered accidentally when a build pipeline failed with a \u201cfetch is not defined\u201d error as the malware attempted to exfiltrate data using the fetch function.<\/p>\n<p>\u201cIf you use a hardware wallet, pay attention to every transaction before signing, and you\u2019re safe. If you don\u2019t use a hardware wallet, refrain from making any on-chain transactions for now,\u201d <a href=\"https:\/\/x.com\/P3b7_\/status\/1965094840959410230\" target=\"_blank\" rel=\"noopener\">advised<\/a> Ledger CEO Charles Guillemet.<\/p>\n<p>Explanation of the current npm hack<\/p>\n<p>In any website that uses this hacked dependency, it gives a chance to the hacker to inject malicious code, so for example when you click a \u201cswap\u201d button on a website, the code might replace the tx sent to your wallet with a tx sending money to\u2026<\/p>\n<p>\u2014 0xngmi (@0xngmi) <a href=\"https:\/\/twitter.com\/0xngmi\/status\/1965125988016087050?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 8, 2025<\/a><\/p>\n\n<h2>Broad Attack Vector<\/h2>\n<p>While the malware\u2019s payload specifically targets cryptocurrency, the attack vector is much broader. It\u00a0affects any environment running JavaScript\/Node.js applications, such as web applications running in browsers, desktop applications, server-side Node.js applications, and mobile apps using JavaScript frameworks.<\/p>\n<p>So a regular business web application could unknowingly include these malicious packages, but the malware would only activate when users interact with cryptocurrency on that site.<\/p>\n<p><a href=\"https:\/\/cryptopotato.com\/uniswap-reclaims-crown-amid-dex-market-volatility-and-pancakeswap-decline\/\">Uniswap<\/a> and <a href=\"https:\/\/x.com\/Blockstream\/status\/1965160059908022319\" target=\"_blank\" rel=\"noopener\">Blockstream<\/a> were among the first to reassure users that their systems were not at risk.<\/p>\n<p>Regarding the reports of the NPM supply chain attack:<\/p>\n<p>Uniswap apps are not at risk<\/p>\n<p>Our team has confirmed that we do not use any vulnerable versions of the affected packages<\/p>\n<p>As always, be vigilant<\/p>\n<p>\u2014 Uniswap Labs (@Uniswap) <a href=\"https:\/\/twitter.com\/Uniswap\/status\/1965162488233930800?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 8, 2025<\/a><\/p>\n\n<p>The post <a href=\"https:\/\/cryptopotato.com\/crypto-stealing-malware-infiltrates-core-javascript-libraries-used-by-millions\/\">Crypto-Stealing Malware Infiltrates Core JavaScript Libraries Used by Millions<\/a> appeared first on <a href=\"https:\/\/cryptopotato.com\/\">CryptoPotato<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>The NPM (node packet manager) account of developer \u2018qix\u2019 was compromised, allowing hackers to publish malicious versions of his packages. The attackers published malicious versions of dozens of extremely popular JavaScript packages, including fundamental utilities. The hack was massive in scope since the affected packages have over 1 billion combined weekly downloads. This attack on [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":95179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-95178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-discovery"],"_links":{"self":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/95178"}],"collection":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=95178"}],"version-history":[{"count":0,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/95178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/media\/95179"}],"wp:attachment":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=95178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=95178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=95178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}