Hackers Reaped Minimal Gains from Massive npm Supply Chain Attack
Leveraging this access, the attacker published malicious releases of several widely used packages, most notably debug and chalk, embedding obfuscated payloads designed to intercept network and cryptocurrency wallet APIs in the affected front-end bundles.
Within two hours, the compromise was detected and remediated, but not before the tainted versions spread widely across cloud environments.
The initial compromise unfolded when the attacker engaged Qix via a crafted phishing message. Once the account credentials were obtained, the threat actor pushed versions such as debug@4.4.2 and chalk@5.6.1, along with dozens of dependencies, including supports-hyperlinks@4.1.1, color-string@2.1.1, and ansi-regex@6.2.1.
Each package contained an identical obfuscated routine that injected a browser-side interceptor into JavaScript bundles. Upon page load, this interceptor wraps core web APIs fetch, XMLHttpRequest, and wallet interfaces, such as window.ethereum.request and Solana’s transaction-signing methods.
The code scanned outgoing and incoming payloads for cryptocurrency address patterns (ETH, BTC, SOL, TRX, LTC, BCH) and silently rewrote destination and spender fields to attacker-controlled addresses.
To evade casual inspection, the modification used look-alike characters so that the UI displayed expected values even as the transaction was rerouted. Since the malicious logic activated only in the user’s browser before signing, victims remained unaware of the theft until after funds were diverted.
By 11 AM EST, maintainers acknowledged the compromise and initiated the removal of the malicious versions. The npm registry was scrubbed of the malicious packages by early afternoon, but not before automated CI/CD pipelines and local development installs had propagated the tainted code.
JFrog’s telemetry indicates that at least 10 percent of cloud environments serving JavaScript assets had bundled the malicious payload during the two-hour window, demonstrating the alarming speed of supply chain propagation.
Despite the prevalence of targeted packages, debug alone appeared in 99 percent of environments—reported thefts remained minimal. Blockchain forensics show only a handful of unauthorized transfers, suggesting that most spawned bundles were caught before end users transacted.
Nonetheless, security teams endured a “denial-of-service” in the form of emergency incident response: reviewing lockfiles, clearing CI caches, rebuilding assets, and blocklisting dozens of package versions, including @duckdb/node-api@1.3.3 and proto-tinker-wc@0.1.87.
To defend against evolving attacks, organizations must implement private registry blocklists and pin dependencies to vetted versions. All build caches, local and CI, require full invalidation, and CDNs should force asset purges.
Adding subresource integrity (SRI) checks on critical JavaScript modules and temporarily disabling web3 wallet flows can mitigate risk during incident triage. On-chain analysis tools should flag unexpected recipient or allowance changes between 13:16 UTC and 15:15 UTC on September 8.
As threat intelligence evolves, now encompassing DuckDB ecosystem packages, maintainers and security teams must continually update detection rules.
The swift, minimal monetary impact belies the enormous operational toll and underscores how urgently supply chain security demands constant vigilance.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Hackers Reaped Minimal Gains from Massive npm Supply Chain Attack appeared first on Cyber Security News.
The casting search for the next actor to play James Bond is officially underway. Amazon…
I can think of few activities I'd enjoy more than playing a video game on…
The list of nominees for the 2026 Will Eisner Comic Industry Awards has been revealed.…
A newly uncovered malware framework is raising serious alarms across the cybersecurity community. Researchers have…
A widely used JavaScript inter-process communication library has been weaponized again. Socket and Stepsecurity have…
Security researchers at Calif, a Palo Alto-based cybersecurity firm, have used techniques derived from an…
This website uses cookies.