Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
NPM Supply-Chain Compromise Could Expose Crypto Funds to Address-Swapping Malware, Ledger CTO Says

NPM Supply-Chain Compromise Could Expose Crypto Funds to Address-Swapping Malware, Ledger CTO Says

CoinotagCoinotag2025/09/07 16:00
By:Marisol Navaro








  • Malicious address swapping in web wallets targets crypto transactions.

  • Compromised packages include widely used NPM modules like “color-name” and “color-string.”

  • The affected packages have been downloaded over 1 billion times, increasing cross-chain exposure.

NPM supply chain exploit: STOP signing transactions now—verify packages and secure wallets. Learn immediate protective steps.

What is the NPM supply chain exploit?

The NPM supply chain exploit is a compromise of reputable developer accounts that injects a malicious payload into JavaScript packages. The payload can silently swap cryptocurrency addresses in web-based wallets and dApps, putting funds across multiple chains at risk.

How were JavaScript packages compromised?

Security researchers and industry experts reported that a reputable developer account on NPM was breached, allowing attackers to publish tainted updates. The malicious code is designed to run in browser contexts used by crypto websites and can change destination addresses at transaction time.


Which packages and components are affected?

Blockchain security firms identified around two dozen popular NPM packages affected, including small utility modules such as “color-name” and “color-string.” Because NPM is a central package manager for JavaScript, many websites and front-end projects pull these dependencies transitively.

Summary of reported risk by package Package Reported Downloads Risk Level
color-name Hundreds of millions High
color-string Hundreds of millions High
Other utility modules (collective) 1+ billion combined Critical

How can crypto users protect funds right now?

Immediate steps: stop signing transactions on web wallets, disconnect browser wallets from dApps, and avoid interaction with sites that rely on unverified JavaScript. Validate package integrity in development environments and apply strict Content Security Policy (CSP) rules on sites you control.

What precautions should developers take?

Developers must pin dependency versions, verify package signatures where available, run supply chain scanning tools, and audit recent package updates. Reverting to known-good versions and rebuilding from lockfiles can reduce exposure. Use reproducible builds and independent verification for critical front-end libraries.



Frequently Asked Questions

How immediate is the threat to everyday crypto users?

The threat is immediate for users interacting with web-based wallets or dApps that load JavaScript from public packages. If a site depends on the tainted modules, address-swapping code can execute in the browser during transaction flows.

Who identified the compromise and what did they say?

Ledger CTO Charles Guillemet publicly flagged the issue, noting the scale and the mechanism of address swapping. Blockchain security firms also reported the impacted modules. These observations come from public posts and security advisories reported by industry experts.

Key Takeaways

  • Stop signing transactions: Avoid signing in web wallets until packages are verified.
  • Audit dependencies: Developers must pin, sign, and scan NPM packages used in front-end code.
  • Use defensive measures: Disconnect wallets, clear sessions, and employ CSP and supply-chain scanning tools.

Conclusion

The NPM supply chain exploit demonstrates how small utility packages can pose systemic risk to crypto users by enabling silent address substitution. Maintain defensive posture: stop signing transactions, audit dependencies, and follow verified advisories. COINOTAG will update this report as more confirmed technical details and remediations are published (published 2025-09-08).

In Case You Missed It: Ethereum ETF Flows and CME Open Interest Could Signal Market Maturation and Potential Demand Revival
0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

Will PayFi be the next narrative for RWA?

Can uncollateralized credit lending protocols work in the DeFi world?

雨中狂睡2025/09/13 18:03
Will PayFi be the next narrative for RWA?

a16z's Latest Insight: Consumer AI Companies Will Redefine the Enterprise Software Market

The boundaries between the consumer market and the enterprise market are gradually becoming blurred to some extent.

BlockBeats2025/09/13 17:54
a16z's Latest Insight: Consumer AI Companies Will Redefine the Enterprise Software Market