Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads

Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads

Posted on September 9, 2025September 9, 2025 By CWS

Within the largest provide chain assault, hackers compromised 18 widespread npm packages, which collectively account for over two billion downloads per week. The assault, which started on September eighth, concerned injecting malicious code designed to steal cryptocurrency from customers.

The compromised packages embrace extensively used libraries reminiscent of chalk, debug, ansi-styles, and supports-color. The malicious code was added in new variations of those packages and was engineered to execute on the client-side of internet sites utilizing them.

The malware silently intercepts cryptocurrency and Web3 actions throughout the browser, manipulating pockets interactions and rewriting fee locations to redirect funds to attacker-controlled accounts.

Common npm Packages Hacked

The malware operates as a classy in-browser interceptor, concentrating on each community visitors and application-level APIs. It achieves this by hooking into core browser features like fetch XMLHttpRequest, in addition to interfaces for widespread crypto wallets for Ethereum, Solana, and different blockchains, Akidio noticed.

The malicious code works in a collection of steps:

Injection and Hooking: It embeds itself into the browser atmosphere and takes management of features associated to net requests and pockets communications.

Scanning for Delicate Knowledge: The malware actively scans community responses and transaction particulars for patterns matching cryptocurrency pockets addresses for numerous blockchains, together with Bitcoin, Ethereum, Solana, Tron, Litecoin, and Bitcoin Money.

Rewriting Pockets Addresses: Upon discovering a legit deal with, the malware replaces it with a look-alike deal with from a hardcoded record belonging to the attackers. That is carried out utilizing string-matching algorithms to make the swap much less noticeable to the person.

Hijacking Transactions: The code alters transaction parameters earlier than the person indicators them. Which means that even when the person interface shows the right recipient deal with, the signed transaction will route funds or grant token approvals to the attackers.

The maintainer of the compromised packages revealed they fell sufferer to a phishing assault. An electronic mail, seemingly from npm help, was despatched from the area npmjs.assist, tricking the developer into revealing their credentials, in accordance with a Hacker Information put up.

This area was registered solely three days earlier than the assault on September 5, 2025.

Phishing Mail compromised the developer

The maintainer turned conscious of the compromise and commenced taking steps to take away the malicious variations of the packages. Nevertheless, on the time of the report, at the least one package deal, simple-swizzle, remained compromised.

The incident additionally revealed that the identical attackers could have compromised one other package deal, proto-tinker-wc, utilizing related strategies.

The next desk lists the affected packages and the compromised variations:

PackageMalicious Versionbackslash0.2.1chalk-template1.1.1supports-hyperlinks4.1.1has-ansi6.0.1simple-swizzle0.2.3color-string2.1.1error-ex1.3.3color-name2.0.1is-arrayish0.3.3slice-ansi7.1.1color-convert3.1.1wrap-ansi9.0.1ansi-regex6.2.1supports-color10.2.1strip-ansi7.1.1chalk5.6.1debug4.4.2ansi-styles6.2.2

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Billion, Downloads, Hackers, Hijacked, NPM, Packages, Popular, Weekly

Post navigation

Previous Post: 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage
Next Post: 20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack

Related Posts

20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials 20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials Cyber Security News
Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack Cyber Security News
Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal Cyber Security News
New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys Cyber Security News
Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark