NPM supply chain attack hijacks JavaScript packages, swaps wallet addresses

Summarize article:
Urban graffiti on a concrete wall with the word 'FIN!' visible, representing creative street art.
Stay updated on crypto

By BlockAI

Lead: Security teams and developers have issued an urgent warning after researchers uncovered a widespread NPM supply chain attack that can silently steal funds by swapping addresses in crypto transactions. The NPM supply chain attack centers on compromised JavaScript packages used across the global JavaScript ecosystem. Developers, wallet providers, and everyday cryptocurrency users are told to pause transacting until fixes roll out because this NPM supply chain attack actively replaces destination addresses during signing. This NPM supply chain attack is ongoing and requires immediate attention from projects that pull code from NPM.

Immediate attack alert

The NPM supply chain attack surfaced after a reputable JavaScript developer’s NPM account was taken over and malicious versions of popular modules appeared. Those modules include color-name and color-string, and the malicious packages were merged into many dependency trees. Blockaid, Ledger CTO Charles Guillemet, and developer Cygaar flagged the behavior, describing how the NPM supply chain attack substitutes wallet addresses at runtime to siphon funds. Given more than a billion downloads of the affected packages, the NPM supply chain attack could reach many websites and DApps.

Address swapping explained

At the core of the NPM supply chain attack is address swapping: JavaScript code intercepts or rewrites destination addresses to the attacker’s wallet during a transaction flow. Address swapping is dangerous because users see familiar UIs while the underlying code silently reroutes cryptocurrency transfers. The exploit works across chains when frontends or libraries perform client-side signing or address formatting, making every crypto app using those NPM packages a potential target of this supply chain attack.

JavaScript ecosystem impact

The JavaScript ecosystem relies on small, reusable modules like color-name and color-string, so dependency compromise cascades quickly. Many projects import these modules indirectly and inherit the malicious payload without realizing it. The NPM supply chain attack doesn’t target a single chain; it leverages the distribution model of NPM to impact multiple wallets and web apps that handle crypto transactions.

Affected malicious packages

Security teams traced malicious packages and their versions, and identified how attackers pushed payloads through compromised accounts. The packages labeled as malicious packages often mimic benign modules and sneak into builds. Users should audit package-lock files, check for unexpected updates, and temporarily remove dependencies tied to the NPM supply chain attack until maintainers publish clean releases.

Protect wallet security

Wallet security guidance is simple but urgent: stop signing unfamiliar transactions and avoid transacting from browsers or apps that may load compromised NPM code. Hardware wallets and on-device signing reduce exposure, but the NPM supply chain attack can still infect web UIs that create or format addresses. Verify addresses manually, use trusted software, and consider pausing large transfers until the ecosystem confirms patches.

Dependency compromise fix

Developers should lock dependencies, pin versions, and run fresh audits to find any dependency compromise stemming from the NPM supply chain attack. Revert to known-good commits, rotate keys if private keys were exposed, and scan builds for injected scripts. Coordinate with package maintainers to confirm clean versions of color-name, color-string, and other modules before resuming normal dependency updates.

Bottom line for users

This NPM supply chain attack is a supply chain attack that affects the broader crypto community and the JavaScript supply chain supporting it. Pause critical transactions, follow updates from security firms, and treat any prompting to sign transactions with skepticism. The faster developers and users act, the smaller the window attackers have to exploit address swapping and siphon cryptocurrency.

Frequently asked questions about NPM supply chain attack (FAQ)

What is the NPM supply chain attack?

A: The NPM supply chain attack is a campaign where attackers used a compromised NPM account to publish malicious packages that swap addresses and steal cryptocurrency during transactions.

Which packages are affected?

A: Reports highlight color-name and color-string among others; any package pulled through dependency chains on NPM could be affected.

Should I stop using my wallet?

A: Avoid signing transactions in web apps that load untrusted code. Use hardware wallets and verified software, and pause large transfers until issues are resolved.

How can developers respond?

A: Pin dependencies, audit package-lock files, revert to clean commits, and coordinate with maintainers to publish safe versions to mitigate the dependency compromise.

Who reported the issue?

A: Security researchers, blockchain security firm Blockaid, developer Cygaar, and Ledger CTO Charles Guillemet helped surface and analyze the threat.

Sources to this article

No first-party sources were used in the compilation of this article.

Share article

Stay updated on crypto

Subscribe to our newsletter and get the latest crypto news, market insights, and blockchain updates delivered straight to your inbox.

Related news

Illustration of a curious ghost asking if a rectangular opening is an exit

Google Gemini 2.5 Flash Image AI turns selfies into 1/7-scale miniatures

Reading time: 4:14 min

Discover Google Gemini 2.5 Flash Image AI turning selfies into hyperrealistic 1/7-scale digital figurines—see upload tips, free vs pro perks and global reach.

Read more
Person in patterned shirt gesturing with both hands against a blue background

PDGrapher predicts gene–drug combinations to reverse diseased cell states

Reading time: 3:31 min

Discover PDGrapher’s gene–drug predictions to reverse diseased cell states — AI-driven mechanistic insights for precision care in Parkinson’s and Alzheimer’s.

Read more
Person wearing a headset and using a smartphone, possibly browsing crypto news

AlterEgo silent communication wearable reads neuromuscular signals for private, hands-free control

Reading time: 2:6 min

Discover how the AlterEgo silent communication wearable reads neuromuscular jaw and throat signals for private hands-free control, uncover its ML decoding.

Read more
NyhedsbrevHold dig opdateret