Ledger CTO warns of shocking NPM attacks by crypto hackers
Briefly

Ledger CTO warns of shocking NPM attacks by crypto hackers
"Malicious actors have found a way to hide open-source malware in Ethereum smart contracts, as per a recent report. On Sep. 3, the software security firm ReversingLabs released a report as per which hackers used code to hide command-and-control (C2) instructions within two Node Package Manager (NPM) packages. Node Package Manager (NPM) is the default package manager for Node.js, used to install, manage, and share reusable code packages (also called modules) for JavaScript projects."
"Guillemet asked those using a hardware crypto wallet to pay attention to every transaction before signing to keep their virtual assets safe. He asked those using a software wallet to refrain from making any transactions for now. "If you use a Ledger or hardware wallet with clear signing, you are not at risk," he added. The exploited NPM packages have been downloaded over 1 billion times, which means the entire JavaScript ecosystem may be at risk, Guillemet warned."
Malicious actors embedded open-source malware into Ethereum smart contracts by concealing command-and-control (C2) instructions within two NPM packages uploaded in July. The C2 instructions enabled the malware to request next-stage payload locations dynamically, avoiding hard-coded links and helping evade security detection. Node Package Manager (NPM) serves as the default package manager for Node.js and these two packages had wide usage, with cumulative downloads exceeding one billion. The covert design increases risk across the JavaScript ecosystem and can enable cryptocurrency-focused supply chain attacks, including address-swapping payloads that silently redirect funds during transactions. Users of software wallets face higher exposure; hardware wallets with clear signing reduce risk.
[
|
]