Source:
ChatGPT:
Guillemet explained that the injected code silently swaps cryptocurrency addresses, redirecting funds to attackers without user awareness. This method, he warned, could endanger countless websites and applications — including crypto projects that rely heavily on JavaScript dependencies. Developers such as @0xCygaar and @0x_ultra highlighted that widely used packages like Chalk and its dependencies were impacted, noting billions of weekly downloads.
While the packages were reportedly patched around 15:15 UTC and NPM has disabled compromised versions, concerns remain that some website frontends could still be vulnerable. The package maintainer confirmed their account was hijacked after receiving a phishing email impersonating npmjs.com. Attackers threatened account lockouts to pressure maintainers into clicking malicious links.
Guillemet emphasized that users of hardware wallets like Ledger with “clear signing” are safe, provided they verify each transaction before approval. Those relying solely on software wallets are advised to halt onchain transactions temporarily.
The attack recalls earlier high-profile thefts, such as the $1.5 billion drained from Bybit by North Korean hackers, underscoring the crypto industry’s ongoing exposure to sophisticated exploits. Developers are urged to audit dependencies immediately and ensure their applications have not pulled compromised updates.
Though mitigations are underway, security experts caution that vigilance is crucial until the full extent of the attack is confirmed.
No comments:
Post a Comment