New Security Breach Threatens Crypto And Everyday Apps

A serious security breach has sent shockwaves through both everyday online services and the cryptocurrency world. At the center is “npm”, which in business terms works like an app store for software building blocks. Just like an app store provides apps for your phone, npm supplies small pieces of code that developers use to build websites, mobile apps, and cloud platforms. According to the NPM Blog, these building blocks are downloaded more than a billion times every week and quietly power much of the internet.

Because npm serves as a central hub, nearly every company with an online presence depends on it, often without realizing it. When npm is compromised, even businesses that never directly touch it can feel the impact through the software they buy or the services they use. Per Reddit, these 5000 npm packages consume >4.5 PB of traffic per week and that was one year ago.

In this case attackers took control of a trusted developer’s account and slipped altered versions of popular code into circulation. Those packages spread quickly into the software behind websites, apps, and services that consumers use daily. It is similar to a global shipping warehouse being infiltrated. Once tainted goods enter the system, they travel everywhere downstream.

How the Security Breach Happened

The breach started with a phishing email that tricked the developer into giving up account access. Once inside, the attackers pushed out new versions of widely used npm packages that looked normal but contained hidden instructions. Because the packages came from a trusted name, they were downloaded quickly by developers and woven into applications without suspicion.

This mattered more than usual because the compromised developer worked closely with the most popular maintainer in the npm community. Together their projects form the foundation of countless applications. Controlling one account created a ripple effect that reached into thousands of other systems.

Why Security Matters for Business

For executives, this incident highlights how fragile the digital supply chain has become. Modern business runs on open source code, and npm is the largest source of that code. Even if your company never installs anything from npm directly, your vendors and partners almost certainly do. A weakness in npm can quickly become your weakness too.

The risks are wide ranging. Altered code can cause outages that disrupt customer experiences. It can provide new ways for criminals to steal sensitive data. It can erode brand trust if customers discover that their information was exposed. Regulators are also raising expectations, which means more scrutiny and potential penalties if businesses cannot show they are protecting their digital supply chains.

This attack also has a direct link to cryptocurrency.

Researchers found that the malicious code was designed to quietly replace wallet addresses during transactions. That means if a person or company tried to send funds to a trusted destination, the code could switch the address to one owned by the attacker. The result is direct financial theft. (Note: Security was breached in Europe that could have been helped with Decentralized infrastructure.)

Security and the Ledger Warning

This is why the Chief Technology Officer of Ledger issued such a strong warning. His advice was simple. If you use a hardware wallet, which is a physical device that requires you to manually approve every transaction, you are safe as long as you carefully review each one before confirming. If you do not use a hardware wallet, it is better to pause blockchain transactions until the risk is resolved.

The reasoning is clear.

A hardware wallet forces you to look at where your money is going. If something looks wrong, you can stop it before funds leave your account. Without it, you may never know that your transaction has been hijacked.

As a reminder, Ledger also communicated quickly during the ByBit issue as well.

What Security Leaders Should Do Now

There are concrete actions that executives can take now.

1. Ask your teams and vendors to provide a full list of the code packages they use so you understand your exposure.

2. Make sure any known compromised versions are removed or updated.

3. Require vendors to explain how they monitor for software supply chain risks.

4. Consider investing in automated tools that review new code updates before they reach your systems.

5. And above all, build a culture where employees think twice before clicking on suspicious emails. Even experienced developers can be tricked, especially when stressed or distracted.

The Future of Supply Chain Security

This is not an isolated event. Attacks on the software supply chain are increasing because they give criminals enormous leverage. By targeting one central hub, they can affect thousands of downstream businesses. Expect governments to tighten rules, requiring companies to track and disclose their dependencies. There may also be new funding models to better support open source projects that today rely on a handful of unpaid volunteers.

Artificial intelligence will likely become an important tool in spotting unusual behavior in code at a scale humans cannot manage alone. Boards will face growing pressure to treat software supply chain security as a core business responsibility rather than a technical afterthought. Investors and insurers are already adjusting their expectations to reflect this reality.

Final Word on Security and Trust

The npm breach is a stark reminder of how fragile digital trust can be. One phishing email led to billions of downloads of compromised code, which in turn opened the door to stolen funds and damaged businesses.

For business leaders, the lesson is clear. The open source code that powers your apps and services is both a strength and a vulnerability. Companies that treat their digital supply chain with the same seriousness as their physical supply chain will reduce risk and build trust with customers and partners. The digital economy depends on shared code.

It is time to put just as much effort into shared security.

Source: https://www.forbes.com/sites/digital-assets/2025/09/08/new-security-breach-threatens-crypto-and-everyday-apps/