ETHSecurity Community
This is the farcaster instantiation of the great and lindy ETHSecurity community which exists on Telegram and elsewhere.
0 reply
1 recast
1 reaction
0 reply
2 recasts
10 reactions

Here is everything you need to know on today's NPM hack in the context of crypto:
> NPM is used by node.js and pretty much every website
> NPM maintainer Josh Junon (Qix-) fell for a phishing email mimicking npmjs website
> Attackers compromised his account. injecting malware into 18 popular JavaScript packages that had 2.6 billion weekly downloads
> Malicious versions (e.g., [email protected], [email protected]) were published and later yanked by npm within hours.
> Malware targets crypto users by altering transactions before signing, but users must approve the bad tx: it's not automatic drainage
> Attack affects the entire JavaScript ecosystem, including dApps. But only impacts fresh installs/pulls during the ~2.5-hour breach (9-11:30 AM ET). Pinned dependencies reduce spread.
> Attack detected by firms like Aikido, Socket, and Blockaid; npm responded quickly
> Your wallet is probably safe and the effective impact area is much smaller than "all websites", but you cannot really know if a project pinned dependencies, or if they have some dynamically downloaded dependency (very unlikely)
> it's just safer to avoid using crypto websites till this blows over and they clean up the bad packages. or us HW and check all the transaction data
Btw I am not a security expert, this is just from things I read online. @officer_cia let me know if I missed anything.
--- HOW THE MALWARE WORKS ---
The obfuscated JavaScript payload:
> Hooks into browser APIs (e.g., XMLHttpRequest, fetch) to intercept network traffic.
> Scans responses for crypto wallet addresses using regex patterns for chains like Bitcoin (BTC), Ethereum (ETH), Solana (SOL), Tron (TRX), Litecoin (LTC), and Bitcoin Cash (BCH).
> Replaces detected addresses with ~30 attacker-controlled ones (e.g., 0xFc4a4858bafef54D1b1d7697bfb5c52F4c166976) that mimic originals (same prefix/suffix).
> Activates in front-end environments, potentially during package install (postinstall scripts) or runtime in apps/CLIs
> When signing the transaction, you still see "bad" transaction. So if you are careful you can avoid it
--- THIS IS ONLY ONE OF THE POSSIBLE WAYS --- 0 reply
0 recast
4 reactions
0 reply
1 recast
2 reactions
3 replies
11 recasts
42 reactions
3 replies
0 recast
2 reactions
0 reply
0 recast
1 reaction
0 reply
0 recast
4 reactions
3 replies
6 recasts
20 reactions
1 reply
2 recasts
2 reactions
0 reply
2 recasts
2 reactions
0 reply
1 recast
0 reaction
0 reply
1 recast
2 reactions
0 reply
0 recast
2 reactions
0 reply
0 recast
1 reaction