TL;DR
- Hackers breached a Node Package Manager (NPM) account tied to a popular developer.
- Malicious code was added to JavaScript libraries downloaded over 1 billion times.
- Attack targeted Ethereum and Solana wallets through injected malware.
- Despite the massive scope, only $50 worth of crypto has been stolen so far.
- Security researchers warn projects to check dependencies and avoid updates until cleaned.
A supply chain attack described as the largest in NPM history shook the crypto and developer community this week. According to Security Alliance (SEAL), hackers broke into the NPM account of a well-known software developer and planted malicious code in widely used JavaScript libraries.
These libraries have already been downloaded more than 1 billion times, meaning countless websites and apps could potentially be exposed. The malware was specifically designed to intercept crypto wallet activity, targeting both Ethereum and Solana users.
The Damage - Just $50
Despite the massive reach, the actual stolen amount remains shockingly small: less than $50 in crypto.
SEAL traced the attack to a malicious Ethereum address - 0xFc4a48 - which received a handful of tokens. The address collected about five cents worth of ETH and roughly $20 worth of a memecoin, alongside small amounts of niche tokens such as Brett (BRETT), Andy (ANDY), Dork Lord (DORK), Ethervista (VISTA), and Gondola (GONDOLA).
SEAL shared the finding on X, noting that this address is the only one linked to the hack so far.
Why This Matters Even If Losses Are Small
At first glance, $50 sounds like a harmless outcome. But experts warn that the real danger is not the stolen funds - it's the method of attack.
Supply chain hacks allow malicious code to sneak into trusted software dependencies. In practice, this means that websites or applications unknowingly push updates containing harmful code. For users, the risk is subtle: the malware could alter what happens when they click "swap" or approve a wallet transaction.
Security researcher 0xngmi, founder of DeFiLlama, explained it clearly:
In other words: your wallet isn't automatically compromised, but extra caution is required.
Why the Impact Is Limited
Fortunately, several factors have reduced the severity of this attack:
- Most crypto projects "pin" their dependencies - meaning they stick with older versions of libraries instead of pulling the newest one.
- The malware only affects websites or apps that updated after the hack.
- Users would still need to manually approve any malicious transaction.
0xngmi added that while the risk is smaller than it first appeared, users still can't know for certain if a project pinned dependencies. The safest advice for now: be cautious when using crypto websites until developers confirm their software is clean.
A Wake-Up Call for Web3
Even with minimal financial losses, the incident is being described as a "wake-up call" for the crypto industry.
Supply chain hacks are especially dangerous because they don't attack a single project directly - instead, they compromise the shared tools that hundreds of projects rely on. In this case, JavaScript libraries are at the heart of countless websites, wallets, and apps.
If the hackers had executed more aggressively, the damage could have been catastrophic. The fact that only $50 was stolen may indicate that the attackers were testing their method, or that they lacked the infrastructure to exploit it at scale.
What's Next
For now, developers are rushing to check their codebases and confirm whether their projects pulled in the compromised libraries. SEAL is continuing to monitor the malicious address and will publish updates as more information surfaces.
Users, meanwhile, are advised to:
- Avoid interacting with lesser-known crypto websites until updates are confirmed.
- Double-check transaction details in wallets before approving.
- Stay updated through trusted security platforms like SEAL.
Final Thought
The largest NPM supply chain hack in crypto history ended with a surprisingly small haul - less than $50. But the outcome should not distract from the bigger issue. If attackers can slip malware into widely used libraries, they can reach across an entire industry at once.
This time, crypto got lucky. Next time, it might not.