When One Login Shakes the Web: How 18 JavaScript Libraries Got Hijacked

watch 1m, 22s
views 2

14:01, 11.09.2025

Article Content
arrow

  • Fragility of the Software Supply Chain
  • What Needs to Change

A wave of malicious code briefly infiltrated 18 popular JavaScript libraries on NPM, which together receive over 2 billion weekly downloads. The breach began with a single deceptive email. Disguised as an official NPM notice, it asked a maintainer to update two-factor authentication. The message linked to a fake login page that captured a one-time token. With these stolen credentials attackers entered the maintainer’s account, changed his recovery email, and quietly pushed altered versions of widely used packages.

The inserted code targeted cryptocurrency users. It could intercept wallet activity in the browser, manipulate transaction details, and redirect assets without obvious warning. Security company Aikido flagged the tampering through automated scans of repository commits. The poisoned packages were quickly cleaned, but the incident underscored how little it takes to weaponize trusted dependencies.

Fragility of the Software Supply Chain

Specialists noted that the attackers focused on stealing crypto funds instead of attempting broader sabotage, even though access to these libraries could have enabled far more disruptive outcomes. The episode illustrates the weakness of an ecosystem where vast amounts of software depend on a handful of overworked volunteers. Each new dependency multiplies the potential attack surface and makes phishing against just one developer a global risk.

What Needs to Change

Researchers argue that maintainers should adopt stronger publishing rules. Builds should originate only from predictable continuous integration pipelines and ad-hoc uploads must be blocked. Contributors should also rely on phishing-resistant methods such as physical security keys rather than SMS or app-based tokens. Without such safeguards the integrity of the open-source supply chain remains precarious. The story is a reminder that one successful phishing email can ripple through the entire web.

Share

Was this article helpful to you?

VPS popular offers

-24.4%

CPU
CPU
2 Xeon Cores
RAM
RAM
1 GB
Space
Space
20 GB SSD
Bandwidth
Bandwidth
300 GB
KVM-SSD 1024 HK Linux

13 /mo

/mo

Billed annually

-9.2%

CPU
CPU
4 Xeon Cores
RAM
RAM
4 GB
Space
Space
100 GB SSD
Bandwidth
Bandwidth
Unlimited
10Ge-wKVM-SSD 4096 Windows

72 /mo

/mo

Billed annually

-10%

CPU
CPU
10 Xeon Cores
RAM
RAM
64 GB
Space
Space
300 GB SSD
Bandwidth
Bandwidth
Unlimited
KVM-SSD 65536 Linux

181.5 /mo

/mo

Billed annually

-15.5%

CPU
CPU
6 Xeon Cores
RAM
RAM
8 GB
Space
Space
100 GB SSD
Bandwidth
Bandwidth
80 Mbps
DDoS Protected SSD-KVM 8192 Linux

95 /mo

/mo

Billed annually

-10.2%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
150 GB SSD
Bandwidth
Bandwidth
100 Mbps
DDoS Protected SSD-KVM 16384 Linux

123 /mo

/mo

Billed semiannually

-5.9%

CPU
CPU
4 Xeon Cores
RAM
RAM
2 GB
Space
Space
75 GB SSD
Bandwidth
Bandwidth
Unlimited
wKVM-SSD 2048 Windows

14.8 /mo

/mo

Billed annually

-5%

CPU
CPU
3 Xeon Cores
RAM
RAM
1 GB
Space
Space
40 GB HDD
Bandwidth
Bandwidth
Unlimited
wKVM-HDD 1024 Windows

12.1 /mo

/mo

Billed annually

-9.4%

CPU
CPU
8 Xeon Cores
RAM
RAM
32 GB
Space
Space
200 GB SSD
Bandwidth
Bandwidth
Unlimited
wKVM-SSD 32768 Windows

99.5 /mo

/mo

Billed annually

-15.4%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
150 GB SSD
Bandwidth
Bandwidth
100 Mbps
DDoS Protected SSD-wKVM 16384 Windows

130 /mo

/mo

Billed annually

-10%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
400 GB HDD
Bandwidth
Bandwidth
300 Gb
KVM-HDD HK 16384 Linux

40.26 /mo

/mo

Billed annually

Other articles on this topic

cookie

Accept cookies & privacy policy?

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the HostZealot website.