NPM Supply Chain Breach Could Have Redirected Ethereum Transactions via Malicious JavaScript Packages

Binance 20% Trading Fee Rebate

  • Supply chain breach of NPM packages introduced a crypto-clipper

  • Attack targeted Ethereum and Solana wallets via address-replacing malware in dependencies

  • Malicious address identified as 0xFc4a48; researchers report under $50 stolen so far

NPM supply chain attack injected a crypto-clipper into JavaScript libraries; learn how to check wallets and protect funds — read the full breakdown and steps to stay secure.

‘,

🚀 Advanced Trading Tools Await You!
Maximize your potential. Join now and start trading!

‘,

📈 Professional Trading Platform
Leverage advanced tools and a wide range of coins to boost your investments. Sign up now!


];

var adplace = document.getElementById(“ads-bitget”);
if (adplace) {
var sessperindex = parseInt(sessionStorage.getItem(“adsindexBitget”));
var adsindex = isNaN(sessperindex) ? Math.floor(Math.random() * adscodesBitget.length) : sessperindex;
adplace.innerHTML = adscodesBitget[adsindex];
sessperindex = adsindex === adscodesBitget.length – 1 ? 0 : adsindex + 1;
sessionStorage.setItem(“adsindexBitget”, sessperindex);
}
})();

What was the NPM supply chain attack that targeted crypto wallets?

The NPM supply chain attack was a compromise of a developer’s NPM account that allowed attackers to inject a crypto-clipper into popular JavaScript libraries. The malware silently replaces wallet addresses during transactions, targeting Ethereum and Solana users; researchers report less than $50 stolen so far.

How did attackers distribute the crypto-clipper through JavaScript libraries?

Attackers gained access to a widely used NPM developer account and modified packages buried deep in dependency trees. The compromised packages include chalk, strip-ansi, and color-convert, each downloaded hundreds of millions to billions of times, thereby exposing countless projects and developer workstations.

01992b4c 9f4b 7eda 9021 1850d037005d
Source: Security Alliance

Which wallets and addresses were affected and what was stolen?

Security Alliance reports the attackers specifically aimed at Ethereum and Solana transactions. Blockchain monitoring shows the suspected malicious address as 0xFc4a48. Initial takings were tiny — 5 US cents in ETH and roughly $20 in memecoins — later aggregated to under $50 at the time of reporting.

Reported takings by asset (approximate)
AssetReported Amount
Ether (ETH)$0.05 (initially reported)
Memecoins (BRETT, ANDY, DORK, VISTA, GONDOLA)~$20
Total reported so far<$50

Why are dependency packages like chalk a high-risk vector?

Small utility packages are deeply nested in many projects’ dependency trees. Developers frequently inherit these modules without direct installs, creating a wide blast radius when trusted packages are compromised. The high download counts mean a single compromised maintainer account can affect millions of developer environments.

‘,

🔒 Secure and Fast Transactions
Diversify your investments with a wide range of coins. Join now!

‘,

💎 The Easiest Way to Invest in Crypto
Dont wait to get started. Click now and discover the advantages!


];

var adplace = document.getElementById(“ads-binance”);
if (adplace) {
var sessperindex = parseInt(sessionStorage.getItem(“adsindexBinance”));
var adsindex = isNaN(sessperindex) ? Math.floor(Math.random() * adscodesBinance.length) : sessperindex;
adplace.innerHTML = adscodesBinance[adsindex];
sessperindex = adsindex === adscodesBinance.length – 1 ? 0 : adsindex + 1;
sessionStorage.setItem(“adsindexBinance”, sessperindex);
}
})();

Experts recommend immediate auditing of recent installs and running integrity checks on dependencies. Ledger’s CTO Charles Guillemet urged extra caution when confirming on-chain transactions. Practical steps include verifying wallet addresses manually, using hardware wallets for high-value transfers, and scanning workstations for suspicious processes.

Check package-lock.json or yarn.lock for references to chalk, strip-ansi, or color-convert, review recent package updates, and compare checksums against known clean releases. Use offline verification or reproduce builds in an isolated environment.

Yes. Because the clipper modifies clipboard or transaction data at the system level, any developer workstation or user environment that performs clipboard-based or injected address operations could be at risk, regardless of whether the project is crypto-native.

Hardware wallets significantly reduce risk because they require on-device confirmation of transaction outputs. However, users should still verify receiving addresses on the hardware device’s screen and keep firmware up to date.


];

var adplace = document.getElementById(“ads-htx”);
if (adplace) {
var sessperindex = parseInt(sessionStorage.getItem(“adsindexHtx”));
var adsindex = isNaN(sessperindex) ? Math.floor(Math.random() * adscodesHtx.length) : sessperindex;
adplace.innerHTML = adscodesHtx[adsindex];
sessperindex = adsindex === adscodesHtx.length – 1 ? 0 : adsindex + 1;
sessionStorage.setItem(“adsindexHtx”, sessperindex);
}
})();

Source: https://en.coinotag.com/npm-supply-chain-breach-could-have-redirected-ethereum-transactions-via-malicious-javascript-packages/