By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
tygo cover main logo light
  • Latest
  • AI
  • Coding
  • Cyber Security
  • Gadgets
  • Gaming
  • More
    • Automotive Technology
    • PC & Software
    • Startups
    • Tech Lifestyle
Reading: npm Supply Chain Attack: How One Phishing Email Compromised Billions of Downloads
Font ResizerAa
Tygo CoverTygo Cover
Search
  • Home
  • AI
  • Automotive Technology
  • Coding & Development
  • Cyber Security
  • Gadgets & Reviews
  • Gaming
  • Startups
Follow US
  • About Us
  • Terms & Conditions
  • Disclaimer
  • Privacy Policy
  • Copyright Policy (DMCA)
  • Cookie Policy
  • Contact
Copyright © 2025 Tygo Cover. All Rights Reserved.
Tygo Cover > Cyber Security > npm Supply Chain Attack: How One Phishing Email Compromised Billions of Downloads

npm Supply Chain Attack: How One Phishing Email Compromised Billions of Downloads

Anatomy of a Crisis: How a Single Phishing Email Led to a Massive npm Supply Chain Attack

Owais Makkabi
Last updated: September 20, 2025 2:22 am
Owais Makkabi
Cyber Security
Share
6 Min Read
A broken link in a digital supply chain, symbolizing the npm supply chain attack.

The open-source software ecosystem, the foundation upon which much of the modern internet is built, has been dealt another staggering blow. A sophisticated and widespread npm supply chain attack has compromised more than 20 popular packages, including cornerstone libraries like chalk and debug which collectively see over two billion weekly downloads. The root cause wasn’t a complex, zero-day exploit; it was a simple, devastatingly effective phishing attack against a single, trusted developer.

This incident is a stark reminder of the immense fragility of the software supply chain and the trust-based model it relies on. The attack, which later expanded to compromise another high-profile developer account, deployed a cunning, browser-based malware designed to steal cryptocurrency from end-users.

This report by Owais Makkabi breaks down the anatomy of this critical npm supply chain attack, analyzes the malware’s payload, and explores the broader implications for the entire Coding & Development community.

The First Domino: A Classic Phishing Attack

The entire crisis began with a single maintainer’s account being compromised. Josh Junon (known as “Qix”), a co-maintainer of numerous essential packages, received a phishing email masquerading as an official message from npm. The email urged him to update his two-factor authentication (2FA) credentials via an embedded link.

This link led to a phishing page that used an adversary-in-the-middle (AitM) attack to steal his username, password, and, crucially, his 2FA token in real-time. With these credentials, the attackers gained full access to his npm account and immediately began publishing malicious versions of the packages he maintained.

In a candid post on Bluesky, Junon apologized to the community, stating, “Sorry everyone, I should have paid more attention… have had a stressful week.” His message highlights the immense pressure on under-resourced open-source maintainers who are now the primary targets for such attacks.

The Payload: A Cunning Crypto Wallet-Drainer

Once the malicious package versions were published, security researchers quickly began to analyze the obfuscated payload. The malware is not designed to attack developers’ machines directly, but rather the end-users of websites that use the compromised packages.

According to analysis from security firms Aikido Security and Socket, the malware acts as a browser-based interceptor:

  • It first checks to ensure it is running in a browser environment.
  • It then “hooks” into core browser functions like window.fetch and XMLHttpRequest, as well as crypto wallet APIs like window.ethereum.request.
  • When a user with a connected crypto wallet tries to make a transaction, the malware intercepts the request and swaps the destination wallet address with one controlled by the attacker.

This makes the npm supply chain attack particularly insidious, as the malicious activity happens silently on the user’s browser, completely unknown to the website they are visiting.

The Domino Effect: Attack Expands to DuckDB

The attack didn’t stop with Qix. Security researchers at Sonatype and Socket later confirmed that the same attackers had compromised the account of another high-profile maintainer, duckdb_admin, to distribute the same wallet-drainer malware through an entirely different set of popular packages. This expansion demonstrated the attackers’ organization and ambition, turning a single breach into a widespread campaign. This is a textbook example of the risks inherent to the modern software supply chain.

Related stories

A smartphone homescreen showing the new Google Password Manager app icon.
Google Password Manager App Now Has a Dedicated Android App
Google Gemini calendar hijack attack demonstration showing smart home devices being controlled remotely
Google Gemini Calendar Hijack Exposes Smart Home Security
A map of China with a digital wall around it, representing the China internet outage test.
China’s Hour of Digital Silence: A Mistake, or a Warning?

The Bigger Picture: The Fragile Trust of Open Source

This npm supply chain attack is a symptom of a larger, systemic problem. The open-source model is built on trust, and attackers are increasingly exploiting that trust. As Ilkka Turunen, Field CTO at Sonatype, noted, “Package takeovers are now a standard tactic for advanced persistent threat groups like Lazarus, because they know they can reach a large amount of the world’s developer population by infiltrating a single under-resourced project.”

The incident underscores the urgent need for developers and organizations to adopt more robust security measures, such as locking down dependencies, hardening CI/CD pipelines, and exercising extreme vigilance against phishing attacks. This is a critical challenge for the entire AI and software industry.


Frequently Asked Questions (FAQ)

1. What is an npm supply chain attack?

An npm supply chain attack is a type of cyberattack where a malicious actor compromises a popular package or library in the npm registry. When developers unwittingly install the compromised package, the malicious code is then passed down to the applications and websites they build, potentially affecting millions of end-users.

2. Which popular packages were affected?

The initial attack compromised over 20 packages maintained by “Qix,” including extremely popular ones like chalk, debug, and ansi-styles. The attack later expanded to include packages from the duckdb maintainer.

3. What does the malware do?

The malware is a “wallet-drainer” that runs in the user’s browser. It intercepts cryptocurrency transaction requests and secretly replaces the recipient’s wallet address with one belonging to the attacker, thereby stealing the funds.

4. How can developers protect themselves from this?

Developers can protect themselves by using tools that scan for known vulnerabilities, locking their project’s dependencies to specific, trusted versions, and enabling the strongest possible multi-factor authentication (MFA) on their npm and GitHub accounts.

TAGGED:CodingCyber AttackHackingnpmOpen Source
Share This Article
LinkedIn Reddit Email Copy Link
blank
ByOwais Makkabi
Lead Analyst, Software, Tech, AI & Entrepreneurship
Follow:
Owais Makkabi is a SaaS entrepreneur and AI technology analyst bridging Pakistan's emerging tech scene with Silicon Valley, San Francisco innovation. A former Full Stack Developer turned business builder, he combines deep technical expertise with entrepreneurial experience to decode the rapidly evolving AI landscape.
The Google Play Store logo transforming into a more serious, gamer-focused icon, symbolizing the Google Play Store gaming revamp.
Google Play Store Gaming Revamp: A Serious Shot at Steam?
Gaming
After 15 years, Windows 11 video wallpapers are back! Learn about the modern successor to DreamScene and when you can get this exciting new feature.
Windows 11 Video Wallpapers Are Finally Making a Comeback
PC & Software
An AI robot brain with strings attached like a puppet, symbolizing how to gain control of AI agents.
How to Gain Control of AI Agents: The New “Hypnosis” Threat
Cyber Security
In a historic move, Google is making India a global export hub for its Pixel phones. Devika R. Sharma analyzes this huge win for the Google Make in India Pixel initiative.
Google Make in India Pixel How India is Winning the Tech War
Gadgets & Reviews
In a stunning move, Nvidia invests in Intel $5 billion to secure future chip production. We analyze what this blockbuster deal means for TSMC and tech industry.
Nvidia invests in Intel: $5 Billion a Blockbuster Deal
Startups
Mark Zuckerberg recent demo of Meta AI smart glasses failure, leading to embarrassment.
Meta AI smart glasses failure: A Major Embarrassment for Meta’s AI Vision
AI Gadgets & Reviews
  • About Us
  • Terms & Conditions
  • Disclaimer
  • Privacy Policy
  • Copyright Policy (DMCA)
  • Cookie Policy
  • Contact

Tygo Cover is your guide to the world of technology.

We deliver clear, expert analysis on everything that matters from AI and Auto Tech to Cyber Security and the business of startups. Tech, simplified.

Copyright © 2025 Tygo Cover. All Rights Reserved.

Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?