Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

Open-Source Supply Chain Compromised to Inject Global Web3 Wallet Drainer Malware

A single phishing vector compromised critical JavaScript dependencies, weaponizing the software supply chain to silently hijack user crypto transactions.
November 18, 20253 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

A close-up reveals a sophisticated, metallic device featuring a translucent blue screen displaying intricate digital patterns and alphanumeric characters. A prominent silver frame with a central button accents the front, suggesting an interactive interface for user input and transaction confirmation
The image showcases a detailed, abstract representation of interconnected mechanical segments, predominantly white and silver, encasing a luminous blue energy source. This visual metaphor powerfully illustrates the intricate mechanisms and secure protocols that underpin cryptocurrency and blockchain networks

Briefing

A critical supply chain attack compromised the NPM registry, injecting wallet-draining malware into 18 widely used JavaScript packages. The primary consequence is the silent hijacking of user-initiated cryptocurrency transactions, where the malicious code intercepts and swaps the legitimate recipient address with an attacker-controlled one during the signing process. The exploit, initiated via a phishing attack on a single maintainer’s account, exposed applications relying on packages with a collective 2.6 billion weekly downloads to potential asset theft. This systemic failure demonstrates a profound vulnerability in the foundational trust layer of the Web3 application stack.

A complex, futuristic mechanical structure is prominently displayed, featuring interconnected white segmented panels that form a spherical, open framework. Transparent blue conduits and glowing elements flow through its intricate core, suggesting active pathways and energy transfer

Context

The prevailing risk in the Web3 ecosystem has shifted from isolated smart contract flaws to systemic supply chain vulnerabilities inherent in centralized developer tooling registries. Attackers leveraged the well-documented trust model of open-source dependencies, where a single compromised maintainer account grants write access to critical, widely-embedded libraries. This attack surface existed due to a lack of mandatory, hardware-backed multi-factor authentication and insufficient dependency auditing across the development pipeline.

A prominent circular metallic button is centrally positioned within a sleek, translucent blue device, revealing intricate internal components. The device's polished surface reflects ambient light, highlighting its modern, high-tech aesthetic

Analysis

The attack chain began with a social engineering campaign that successfully compromised a high-privilege NPM maintainer account via a phishing email. The attacker then published malicious versions of foundational packages, embedding code that remained dormant until a user initiated a Web3 transaction. This payload hooked into wallet functions to intercept the transaction payload and execute a recipient address swap, utilizing fuzzy matching algorithms to divert funds across multiple blockchains (ETH, BTC, SOL, TRX). The exploit’s success stems from its position in the software development lifecycle, bypassing on-chain contract audits entirely.

The image showcases a high-tech modular system composed of white and metallic units, connected centrally by intricate mechanisms and multiple conduits. Prominent blue solar arrays are attached, providing an energy source to the structure, set against a blurred background suggesting an expansive, possibly orbital, environment

Parameters

  • Compromised Packages → 18 widely used open-source libraries were poisoned with malicious code.
  • Weekly Download Exposure → 2.6 Billion weekly downloads across the affected libraries, indicating the scale of potential impact.
  • Attack Vector Root → Phishing attack on a single package maintainer’s account credentials.
  • Targeted Chains → Ethereum, Bitcoin, Solana, and Tron transactions were targeted for address swapping.

A large, textured white sphere with prominent rings, appearing to split open, reveals a vibrant expulsion of numerous small blue and white particles. A smaller, similar sphere is partially visible in the background, also engaged in this particulate dispersion

Outlook

Immediate mitigation requires all developers to audit their dependency trees, enforce strict lockfile usage, and update all affected packages to patched versions. This incident establishes a new security baseline, mandating hardware-backed multi-factor authentication for all open-source registry maintainers and requiring runtime transaction monitoring to detect unexpected address rewrites. The broader contagion risk is high, as the exploit demonstrates the fragility of the entire Web3 application layer built on transitive open-source dependencies.

A close-up view captures a highly detailed, intricate mechanical assembly, partially submerged or encased in a translucent, flowing blue material. The metallic components exhibit precision engineering, featuring a prominent central lens-like element, geared structures, and interconnected rods, all gleaming under precise lighting

Verdict

The NPM supply chain compromise confirms that the primary threat vector for digital asset theft has migrated from smart contract logic to the centralized, human-vulnerable infrastructure of developer tooling.

supply chain attack, npm package compromise, malicious code injection, open source risk, wallet drainer malware, transaction hijacking, developer account phishing, crypto asset theft, dependency audit failure, software integrity risk, transitive dependency risk, web3 security failure, recipient address swap, front end attack vector, digital asset security, cryptographic key risk, ecosystem security failure, code execution exploit, developer tooling risk, runtime defense failure Signal Acquired from → getfailsafe.com

Micro Crypto News Feeds

supply chain attack

Definition ∞ A supply chain attack targets the software or hardware supply chain of a digital asset service or platform.

developer tooling

Definition ∞ Developer tooling refers to the software applications and environments that assist programmers in creating, testing, and deploying code.

transaction

Definition ∞ A transaction is a record of the movement of digital assets or the execution of a smart contract on a blockchain.

phishing attack

Definition ∞ A phishing attack is a fraudulent attempt to obtain sensitive information, such as usernames, passwords, and financial details, by disguising oneself as a trustworthy entity in electronic communication.

web3 application

Definition ∞ A Web3 application is a decentralized software program that operates on a blockchain network.

smart contract

Definition ∞ A Smart Contract is a self-executing contract with the terms of the agreement directly written into code.

Tags:

Software Integrity Risk Recipient Address Swap Dependency Audit Failure Code Execution Exploit Runtime Defense Failure Transitive Dependency Risk

Discover More

  • A sleek, white, metallic device, a DLT network node, glows intensely blue internally. It expels a dense white vapor stream, infused with bright blue light, signifying rapid transaction processing and block propagation. This conveys immense computational power for cryptographic hash generation, ensuring data integrity within blockchain infrastructure. The emission symbolizes high transaction throughput and scalability via off-chain computation or Layer 2 scaling, crucial for Web3 infrastructure and DeFi. Balancer Users Drained via DNS Provider Social Engineering Attack A third-party DNS provider compromise redirected users to a malicious front-end, enabling unauthorized token approvals and asset draining.
  • A sleek, white modular device, resembling a sophisticated blockchain node, ejects vibrant blue, luminous fluid and droplets. This dynamic efflux visually interprets the robust processing power and high transaction throughput inherent in a decentralized finance DeFi liquidity pool. The internal mechanisms suggest complex smart contract execution, driving the continuous generation of digital assets. The effervescent blue signifies the rapid flow of value and the secure validation within a distributed ledger, crucial for network consensus. NPM Supply Chain Compromise Redirects Crypto Transactions via Malicious Packages A phishing-induced account takeover enabled malicious code injection into widely used NPM packages, silently rerouting cryptocurrency transactions at the browser level.
  • A vibrant spherical construct, half textured in electric blue and half in frosted white, features multiple transparent metallic blades extending through its core, set against a blurred, snowy mountain landscape. This imagery abstractly represents a decentralized network's protocol architecture, integrating diverse consensus mechanisms or tokenomics models. The blades symbolize sharding for enhanced transaction throughput, facilitating interoperability as cross-chain bridges, or acting as secure hardware wallet components for cold storage within a validator node. It underscores robust cryptographic security and blockchain infrastructure resilience in the Web3 ecosystem. AI Asset Management Agent Compromise Drains Half Million Dollars The on-chain AI agent's vault logic failure permitted unauthorized fund transfers, exposing systemic risk in automated asset control.
  • A futuristic white and metallic cylindrical apparatus, partially submerged in dark blue water, actively processes. Its open end reveals intricate, glowing blue crystalline structures, indicative of intensive cryptographic operations. From this aperture, a torrent of white, granular material and vibrant blue particles forcefully ejects, signifying substantial liquidity injection. This represents a blockchain infrastructure's robust consensus mechanism generating digital asset issuance or executing complex smart contract logic, impacting network throughput within the DLT ecosystem. Website Supply Chain Attack Drains User Wallets via Malicious Script Third-party resource compromise injected a malicious JavaScript drainer, weaponizing a trusted front-end to steal user token approvals.
  • A vibrant blue, metallic, cylindrical core, reminiscent of a robust DLT protocol engine or a validator node, is showcased. Numerous translucent, spherical particles, akin to data packets or cryptographic elements, dynamically interact with its structured surface. These particles appear to be in a state of continuous processing, illustrating the intricate flow of information within a decentralized network. The visual metaphor suggests the constant computation and cryptographic hashing inherent in achieving consensus mechanisms and ensuring data integrity across a blockchain's architecture, perhaps within an enterprise blockchain solution. Forked Protocol Beets Drained via Inherited Balancer V2 Smart Contract Flaw The systemic risk of shared codebase architecture was weaponized, enabling a logic flaw to cascade across forks and drain over $100 million in pooled assets.
  • A metallic, geometrically complex construct, resembling a cryptographic key or a decentralized network node, is intricately integrated with what appears to be fractured bone material. Thin, taut wires, akin to network conduits or blockchain transaction pathways, extend outwards, suggesting connectivity and data flow. This visual metaphor encapsulates the intersection of advanced medical technology, specifically bone grafting and reconstruction, with the underlying principles of decentralized finance and secure, distributed ledger systems. It hints at novel applications for blockchain in healthcare, potentially for secure patient data, supply chain management of medical implants, or even tokenized medical futures. Autonomous AI Agents Exploit Smart Contracts Proving Feasibility of Zero-Day Attacks Commercial AI models successfully exploited smart contract logic, demonstrating autonomous zero-day attack capability and escalating systemic risk.
  • Transparent, luminous blue channels converge into a dark, finned processing unit, suggesting high-speed data transfer. Within the translucent conduits, intricate blue patterns represent cryptographic data streams undergoing active transaction validation. This central component likely functions as a validator node or an interoperability bridge, facilitating secure decentralized ledger operations. The blurred background emphasizes the focused, high-performance nature of this blockchain mechanism, underpinning robust digital asset movement. Decentralized Exchange Front-End Compromised via DNS Hijack Injecting Inferno Drainer A DNS-level compromise injected the Inferno Drainer malware, exposing user wallets to asset-draining transaction approvals.
  • A close-up view reveals a complex metallic and dark blue mechanical component, partially enveloped by numerous translucent blue bubbles. The central focus is a silver-toned square module featuring concentric circular elements, suggesting a cryptographic primitive or a smart contract oracle. Adjacent to it, a detailed gear-like structure hints at underlying consensus mechanism hardware. The effervescent blue foam implies an active network hygiene process, potentially signifying transaction processing or protocol validation within a decentralized ledger technology framework, ensuring data integrity and block finality. UPCX Platform Suffers $70 Million Private Key Compromise and Contract Upgrade Exploit A compromised administrative private key enabled a malicious smart contract upgrade, allowing an attacker to drain $70 million from the UPCX payment platform.
  • A transparent hardware wallet reveals its advanced internal architecture. A central brushed metallic secure element functions as the cryptographic processor, surrounded by intricate, glowing blue circuitry symbolizing active data flow within a decentralized ledger technology DLT network. This device is engineered for robust private key management and secure transaction signing, offering cold storage capabilities. A circular button, potentially for biometric authentication or multi-signature confirmation, integrates into the tamper-proof design, highlighting its role as a secure enclave for digital assets. Upbit Hot Wallet Compromise Drains $36 Million in Solana Network Assets State-sponsored threat actors leveraged compromised administrative credentials to bypass CEX hot wallet security, resulting in a $36.8M asset outflow.

Tags:

Code Execution ExploitCrypto Asset TheftCryptographic Key RiskDependency Audit FailureDeveloper Account PhishingDeveloper Tooling RiskDigital Asset SecurityEcosystem Security FailureFront End Attack VectorMalicious Code InjectionNpm Package CompromiseOpen-Source RiskRecipient Address SwapRuntime Defense FailureSoftware Integrity RiskSupply Chain AttackTransaction HijackingTransitive Dependency RiskWallet Drainer MalwareWeb3 Security Failure

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2026 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.