Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

    January 14, 2026

    New Test-Time Training Lets Models Keep Learning Without Costs Exploding

    January 14, 2026

    UK, Australia, Canada Clash With Elon Musk Over AI Safety, Truss Pushes Back

    January 13, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    Facebook X (Twitter) Instagram Pinterest VKontakte
    TallwireTallwire
    • Tech

      New Test-Time Training Lets Models Keep Learning Without Costs Exploding

      January 14, 2026

      Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

      January 14, 2026

      Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

      January 13, 2026

      Researchers Push Boundaries on AI That Actually Keeps Learning After Training

      January 13, 2026

      UK, Australia, Canada Clash With Elon Musk Over AI Safety, Truss Pushes Back

      January 13, 2026
    • AI News
    TallwireTallwire
    Home»Tech»Widespread npm Supply-Chain Hack Hits 2+ Billion Weekly Downloads
    Tech

    Widespread npm Supply-Chain Hack Hits 2+ Billion Weekly Downloads

    Updated:December 25, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Widespread npm Supply-Chain Hack Hits 2+ Billion Weekly Downloads
    Widespread npm Supply-Chain Hack Hits 2+ Billion Weekly Downloads
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Aikido Security Ltd. has revealed what is now regarded as the largest npm supply-chain attack to date, in which threat actors infiltrated 18 widely used npm packages—such as chalk, debug, and ansi-styles—that collectively account for more than 2.6 billion downloads per week, by phishing maintainers to reset two-factor authentication and push malware-laden versions that hijack cryptocurrency transactions in browsers. For example, injected code intercepts functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana, etc.), enabling so-called “crypto-clipper” malware to silently redirect funds. Security experts warn developers to roll back to known safe versions, audit recent updates, and be cautious with crypto interactions.

    Sources: BeinCrypto, The Register, SiliconANGLE

    Key Takeaways

    – Supply-chain attackers leveraged phishing to breach npm maintainers’ 2FA, enabling tampering with high-profile packages downloaded billions of times weekly.

    – Malicious code—camouflaged as trusted updates—can hijack crypto transactions in-browser, redirecting funds via wallet API interception.

    – Developers must audit their dependencies closely, revert to verified safe versions, and treat crypto-enabled code with enhanced scrutiny.

    In-Depth

    In a sobering demonstration of how deeply the npm ecosystem is woven into modern software development—and how vulnerable that integration can make us—security researchers with Aikido Security have confirmed a massive supply-chain breach that compromised 18 npm packages downloaded more than 2.6 billion times each week.

    The attackers executed a phishing attack that reset two-factor authentication for targeted maintainers, then published poisoned versions of their packages. Key libraries such as chalk, debug, and ansi-styles were rigged with crypto-stealing malware that operates by intercepting browser-level APIs—like fetch, XMLHttpRequest, and wallet interfaces such as MetaMask and Solana—effectively hijacking cryptocurrency transfers without raising suspicion.

    Known as a “crypto-clipper” attack, this technique replaces legitimate wallet addresses with attacker-controlled ones, often invisibly to users. While the full scope of theft remains undetermined, experts urge developers to rely only on previously verified package versions, thoroughly audit recent changes, and exercise caution when deploying or using crypto-involved code. The incident serves as yet another wake-up call on the fragility of open-source software supply chains, where even trusted tools may be weaponized when security safeguards—like phishing resistance and deployment validation—fail.

    This attack underscores two practical imperatives. First, rigorous supply-chain hygiene is indispensable: Teams should pin dependency versions, monitor integrity signals, and use reproducible builds. Second, for developers handling cryptocurrency or sensitive operations, additional layers of trust—manual code review, wallet confirmation mechanisms, or hardware security modules—should be considered essential, not optional. In today’s environment, reliance on convenience without conservative validation may invite serious consequences.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhy Many AI Investments Aren’t Paying Off
    Next Article Windows 11 Patch Sparks Major Streaming Headaches

    Related Posts

    New Test-Time Training Lets Models Keep Learning Without Costs Exploding

    January 14, 2026

    Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

    January 14, 2026

    Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

    January 13, 2026

    Researchers Push Boundaries on AI That Actually Keeps Learning After Training

    January 13, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    New Test-Time Training Lets Models Keep Learning Without Costs Exploding

    January 14, 2026

    Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

    January 14, 2026

    Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

    January 13, 2026

    Researchers Push Boundaries on AI That Actually Keeps Learning After Training

    January 13, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) Instagram Pinterest YouTube
    • Tech
    • AI News
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.