Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

Open-Source Supply Chain Compromised to Inject Global Web3 Wallet Drainer Malware

A single phishing vector compromised critical JavaScript dependencies, weaponizing the software supply chain to silently hijack user crypto transactions.
November 18, 20253 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

A large, textured white sphere with prominent rings, appearing to split open, reveals a vibrant expulsion of numerous small blue and white particles. A smaller, similar sphere is partially visible in the background, also engaged in this particulate dispersion
A multifaceted, crystalline structure radiates outwards from a central, spherical core. The core features concentric rings and a smooth, white central orb, encased in transparent material revealing internal mechanisms

Briefing

A critical supply chain attack compromised the NPM registry, injecting wallet-draining malware into 18 widely used JavaScript packages. The primary consequence is the silent hijacking of user-initiated cryptocurrency transactions, where the malicious code intercepts and swaps the legitimate recipient address with an attacker-controlled one during the signing process. The exploit, initiated via a phishing attack on a single maintainer’s account, exposed applications relying on packages with a collective 2.6 billion weekly downloads to potential asset theft. This systemic failure demonstrates a profound vulnerability in the foundational trust layer of the Web3 application stack.

The image presents a close-up of a futuristic device featuring a translucent casing over a dynamic blue internal structure. A central, brushed metallic button is precisely integrated into the surface

Context

The prevailing risk in the Web3 ecosystem has shifted from isolated smart contract flaws to systemic supply chain vulnerabilities inherent in centralized developer tooling registries. Attackers leveraged the well-documented trust model of open-source dependencies, where a single compromised maintainer account grants write access to critical, widely-embedded libraries. This attack surface existed due to a lack of mandatory, hardware-backed multi-factor authentication and insufficient dependency auditing across the development pipeline.

The image showcases a high-tech modular system composed of white and metallic units, connected centrally by intricate mechanisms and multiple conduits. Prominent blue solar arrays are attached, providing an energy source to the structure, set against a blurred background suggesting an expansive, possibly orbital, environment

Analysis

The attack chain began with a social engineering campaign that successfully compromised a high-privilege NPM maintainer account via a phishing email. The attacker then published malicious versions of foundational packages, embedding code that remained dormant until a user initiated a Web3 transaction. This payload hooked into wallet functions to intercept the transaction payload and execute a recipient address swap, utilizing fuzzy matching algorithms to divert funds across multiple blockchains (ETH, BTC, SOL, TRX). The exploit’s success stems from its position in the software development lifecycle, bypassing on-chain contract audits entirely.

The image presents a detailed, close-up view of a sophisticated blue and dark grey mechanical apparatus. Centrally, a metallic cylinder prominently displays the Bitcoin symbol, surrounded by neatly coiled black wires and intricate structural elements

Parameters

  • Compromised Packages → 18 widely used open-source libraries were poisoned with malicious code.
  • Weekly Download Exposure → 2.6 Billion weekly downloads across the affected libraries, indicating the scale of potential impact.
  • Attack Vector Root → Phishing attack on a single package maintainer’s account credentials.
  • Targeted Chains → Ethereum, Bitcoin, Solana, and Tron transactions were targeted for address swapping.

A sophisticated, futuristic mechanical assembly is centrally featured, composed of metallic silver and dark grey components, including intricate gears and a prominent circular aperture. Transparent blue structural elements partially enclose this advanced mechanism, which is enveloped by a dynamic, granular, foamy substance

Outlook

Immediate mitigation requires all developers to audit their dependency trees, enforce strict lockfile usage, and update all affected packages to patched versions. This incident establishes a new security baseline, mandating hardware-backed multi-factor authentication for all open-source registry maintainers and requiring runtime transaction monitoring to detect unexpected address rewrites. The broader contagion risk is high, as the exploit demonstrates the fragility of the entire Web3 application layer built on transitive open-source dependencies.

A series of interconnected white modular units are displayed, some revealing intricate glowing blue internal mechanisms. These futuristic components are linked linearly, suggesting a structured flow or connection within a complex system

Verdict

The NPM supply chain compromise confirms that the primary threat vector for digital asset theft has migrated from smart contract logic to the centralized, human-vulnerable infrastructure of developer tooling.

supply chain attack, npm package compromise, malicious code injection, open source risk, wallet drainer malware, transaction hijacking, developer account phishing, crypto asset theft, dependency audit failure, software integrity risk, transitive dependency risk, web3 security failure, recipient address swap, front end attack vector, digital asset security, cryptographic key risk, ecosystem security failure, code execution exploit, developer tooling risk, runtime defense failure Signal Acquired from → getfailsafe.com

Micro Crypto News Feeds

supply chain attack

Definition ∞ A supply chain attack targets the software or hardware supply chain of a digital asset service or platform.

developer tooling

Definition ∞ Developer tooling refers to the software applications and environments that assist programmers in creating, testing, and deploying code.

transaction

Definition ∞ A transaction is a record of the movement of digital assets or the execution of a smart contract on a blockchain.

phishing attack

Definition ∞ A phishing attack is a fraudulent attempt to obtain sensitive information, such as usernames, passwords, and financial details, by disguising oneself as a trustworthy entity in electronic communication.

web3 application

Definition ∞ A Web3 application is a decentralized software program that operates on a blockchain network.

smart contract

Definition ∞ A Smart Contract is a self-executing contract with the terms of the agreement directly written into code.

Tags:

Front End Attack Vector Code Execution Exploit Developer Tooling Risk Wallet Drainer Malware Supply Chain Attack Runtime Defense Failure

Discover More

  • Metallic, threaded cylindrical components appear transparent, revealing intricate blue digital patterns within. These structures evoke blockchain architecture, with each component representing a network node or a block in a decentralized ledger. The glowing blue elements symbolize on-chain data or transaction processing, highlighting the secure flow of cryptographic primitives. The metallic threading suggests smart contract execution and interoperability within a distributed computing environment, emphasizing the foundational elements of Web3 infrastructure and digital asset tokenization. The focus is on the intricate mechanics of data immutability. Centralized Stablecoin Bank Drained $50 Million via Private Key Compromise A compromised private key facilitated the exfiltration of $49.5 million in USDC, exposing critical failures in centralized key management.
  • A detailed view of a sophisticated blockchain node showcases a central white digital asset sphere encapsulated by concentric rings. Surrounding the sphere, translucent blue cryptographic primitives form a structured array, symbolizing data sharding within a distributed ledger. Thin black network topology conduits extend, illustrating interoperability and data flow between interconnected modular components. This abstract representation emphasizes secure transaction processing and ledger integrity within a decentralized ecosystem. Developers Targeted by Supply Chain Attack Using Ethereum Smart Contracts A sophisticated supply chain compromise leverages malicious npm packages and deceptive GitHub repositories, utilizing Ethereum smart contracts to covertly deliver malware payloads.
  • A futuristic, polished metallic device, resembling a secure hardware wallet, showcases intricate internal mechanisms beneath a transparent top panel. Vibrant blue light illuminates complex gears and circuitry, indicative of active cryptographic operations within a secure element. This robust design suggests a dedicated cold storage solution for managing private keys and seed phrases. Its advanced engineering supports immutable ledger entries and transaction signing, potentially functioning as a portable DLT node or a trusted execution environment for sensitive blockchain processes, ensuring firmware integrity. Malicious Chrome Extension Steals Seed Phrases via Covert Sui Transactions A high-ranking malicious wallet extension weaponized the Sui blockchain to covertly exfiltrate user mnemonics, bypassing traditional network monitoring.
  • A sophisticated hardware module, metallic with deep blue accents, showcases a central, glowing blue crystalline component. This secure element, likely a cryptographic processor, is engineered for robust private key management and digital asset custody. Its intricate design suggests advanced tamper-proof mechanisms and secure enclave technology, vital for blockchain security. The device facilitates offline transaction signing and seed phrase protection, essential for non-custodial self-custody within decentralized finance DeFi ecosystems, integrating multi-signature or biometric authentication for enhanced asset protection. AI-Generated Wallet Drainer Infiltrates Open-Source Ecosystem via Malicious NPM Package An AI-crafted supply chain attack exploited developer trust in the NPM registry to deploy stealthy wallet-draining malware, compromising end-user funds.
  • A complex, dark metallic hardware component features intricate layered panels and visible circuit board patterns, illuminated by subtle blue light. Robust armored conduits and fine cabling interconnect various modules, suggesting a high-performance cryptographic processing unit. This component represents a critical validator node within a decentralized network, executing smart contract logic or contributing hashing power for proof-of-work consensus. Its sophisticated blockchain architecture ensures data integrity and efficient transaction validation, crucial for distributed ledger technology infrastructure and layer-2 scaling solutions. Bitcoin Hyper Layer-Two Presale Nears $27 Million Validating Hybrid Architecture The Bitcoin Hyper Layer-Two leverages Solana's VM to unlock high-speed, low-cost smart contracts, fundamentally upgrading Bitcoin's DeFi capital efficiency.
  • A translucent, frosted casing encloses a vibrant blue, intricate internal structure, representing a decentralized ledger technology DLT node network. A prominent circular lens acts as a Web3 interface, offering a view into the complex blockchain architecture and its on-chain data. Two grey buttons on the side suggest interaction for digital asset custody and private key management. This hardware wallet design emphasizes cryptographic security and immutable ledger principles, facilitating transaction validation within a decentralized finance DeFi ecosystem. Stablecoin Bank Private Key Compromise Drains Fifty Million USDC Assets Critical internal key management failure allowed a single actor to compromise a $50M treasury, underscoring acute insider risk in centralized custody.
  • A sleek, futuristic hardware device, predominantly silver-grey with dark accents, features a transparent top panel. Encased within are two distinct, icy blue crystalline structures, symbolizing cold storage for digital assets. These structures appear to encapsulate private keys or immutable data blocks secured by cryptographic security. Blue illumination highlights its advanced blockchain node capabilities. The robust design suggests a secure enclave for transaction validation and decentralized ledger operations, crucial for Web3 infrastructure and data integrity, embodying robust non-custodial asset protection. State-Sponsored APT Groups Use InvisibleFerret Backdoor to Steal Digital Assets The InvisibleFerret backdoor, coupled with zero-day exploitation, bypasses endpoint security to exfiltrate wallet data, posing an extreme systemic risk.
  • A gleaming, multi-layered metallic framework forms the core of a sophisticated system, housing embedded radiant blue square panels that display digital patterns. Scattered across its surfaces and within recesses are brilliant blue faceted gems and smaller spherical elements, interspersed with a fine white bubbly foam. This visual metaphor represents a robust blockchain infrastructure managing tokenized assets. The precise framework suggests smart contract execution and layer-2 scaling solutions, while the effervescent bubbles symbolize dynamic liquidity pools facilitating transaction processing within DeFi protocols. DeFi Automated Market Maker Drained via Protocol Precision Manipulation A subtle, systemic flaw in complex pool mathematics allowed for precision rounding manipulation, enabling unauthorized asset draining and immediate liquidity shock across multiple chains.
  • A translucent, frosted component featuring an intricate blue internal lattice structure rests upon a white, perforated grid. This specialized hardware module suggests a high-performance processing unit crucial for blockchain operations. Its design implies advanced thermal management and secure enclave capabilities, vital for robust transaction validation, cryptographic primitive execution, and maintaining network consensus. Such components are integral to ASIC mining rigs, validator nodes, and decentralized data centers, optimizing hashing power and supporting Web3 infrastructure with enhanced digital asset security. Centralized Exchange Hot Wallet Drained Thirty Million Solana Assets A critical operational security failure in a CEX hot wallet led to the rapid exfiltration of $30.2 million in Solana-based tokens.

Tags:

Code Execution ExploitCrypto Asset TheftCryptographic Key RiskDependency Audit FailureDeveloper Account PhishingDeveloper Tooling RiskDigital Asset SecurityEcosystem Security FailureFront End Attack VectorMalicious Code InjectionNpm Package CompromiseOpen-Source RiskRecipient Address SwapRuntime Defense FailureSoftware Integrity RiskSupply Chain AttackTransaction HijackingTransitive Dependency RiskWallet Drainer MalwareWeb3 Security Failure

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2026 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.