When One Login Shakes the Web: How 18 JavaScript Libraries Got Hijacked

watch 1m, 22s
views 2

14:01, 11.09.2025

Article Content
arrow

  • Fragility of the Software Supply Chain
  • What Needs to Change

A wave of malicious code briefly infiltrated 18 popular JavaScript libraries on NPM, which together receive over 2 billion weekly downloads. The breach began with a single deceptive email. Disguised as an official NPM notice, it asked a maintainer to update two-factor authentication. The message linked to a fake login page that captured a one-time token. With these stolen credentials attackers entered the maintainer’s account, changed his recovery email, and quietly pushed altered versions of widely used packages.

The inserted code targeted cryptocurrency users. It could intercept wallet activity in the browser, manipulate transaction details, and redirect assets without obvious warning. Security company Aikido flagged the tampering through automated scans of repository commits. The poisoned packages were quickly cleaned, but the incident underscored how little it takes to weaponize trusted dependencies.

Fragility of the Software Supply Chain

Specialists noted that the attackers focused on stealing crypto funds instead of attempting broader sabotage, even though access to these libraries could have enabled far more disruptive outcomes. The episode illustrates the weakness of an ecosystem where vast amounts of software depend on a handful of overworked volunteers. Each new dependency multiplies the potential attack surface and makes phishing against just one developer a global risk.

What Needs to Change

Researchers argue that maintainers should adopt stronger publishing rules. Builds should originate only from predictable continuous integration pipelines and ad-hoc uploads must be blocked. Contributors should also rely on phishing-resistant methods such as physical security keys rather than SMS or app-based tokens. Without such safeguards the integrity of the open-source supply chain remains precarious. The story is a reminder that one successful phishing email can ripple through the entire web.

Share

Was this article helpful to you?

VPS popular offers

sale

-20%

CPU
CPU
6 Xeon Cores
RAM
RAM
8 GB
Space
Space
200 GB HDD
Bandwidth
Bandwidth
Unlimited
wKVM-HDD 8192 Windows

31.25 /mo

/mo

Billed monthly

sale

-20.5%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
150 GB SSD
Bandwidth
Bandwidth
10 TB
KVM-SSD 16384 Metered Linux

95 /mo

/mo

Billed annually

-15.4%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
150 GB SSD
Bandwidth
Bandwidth
100 Mbps
DDoS Protected SSD-wKVM 16384 Windows

130 /mo

/mo

Billed annually

sale

-20%

CPU
CPU
4 Epyc Cores
RAM
RAM
4 GB
Space
Space
50 GB NVMe
Bandwidth
Bandwidth
Unlimited
KVM-NVMe 4096 Linux

16.45 /mo

/mo

Billed semiannually

sale

-20%

CPU
CPU
3 Xeon Cores
RAM
RAM
1 GB
Space
Space
20 GB SSD
Bandwidth
Bandwidth
Unlimited
KVM-SSD 1024 Linux

6.6 /mo

/mo

Billed monthly

-10%

CPU
CPU
8 Epyc Cores
RAM
RAM
32 GB
Space
Space
200 GB NVMe
Bandwidth
Bandwidth
Unlimited
Keitaro KVM 32768
OS
CentOS
Software
Software
Keitaro

77.54 /mo

/mo

Billed annually

sale

-19.9%

CPU
CPU
4 Xeon Cores
RAM
RAM
2 GB
Space
Space
60 GB HDD
Bandwidth
Bandwidth
300 Gb
KVM-HDD HK 2048 Linux

6.22 /mo

/mo

Billed semiannually

sale

-20%

CPU
CPU
6 Xeon Cores
RAM
RAM
8 GB
Space
Space
200 GB HDD
Bandwidth
Bandwidth
300 Gb
KVM-HDD HK 8192 Linux

20.45 /mo

/mo

Billed monthly

sale

-20%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
150 GB SSD
Bandwidth
Bandwidth
Unlimited
10Ge-KVM-SSD 16384 Linux

231 /mo

/mo

Billed semiannually

sale

-20%

CPU
CPU
2 Xeon Cores
RAM
RAM
512 MB
Space
Space
10 GB SSD
Bandwidth
Bandwidth
Unlimited
KVM-SSD 512 Linux

5.2 /mo

/mo

Billed quarterly

Other articles on this topic

cookie

Accept cookies & privacy policy?

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the HostZealot website.