Ethereum and Solana Under Attack: The Hidden Crypto Threat That Almost Got Everyone

Crypto faced a serious security scare this week. Ledger’s CTO, Charles Guillemet, revealed that a large-scale supply chain attack targeted the JavaScript ecosystem through compromised NPM packages. These packages had been downloaded more than a billion times, raising alarms across the industry.

The malicious code worked by silently swapping crypto wallet addresses on the fly. In practice, this meant users could send funds to the wrong wallet without realizing it. According to Guillemet, people using hardware wallets were safe, since they could see and verify the final transaction before signing. But those relying on software wallets or exchanges were at greater risk.

How the Attack Happened

The attack began with a phishing email sent to a developer. The fake email, disguised as support from npm, tricked the victim into giving up credentials. This gave attackers access to publish malicious updates to widely used packages.

The injected code was designed to hook into crypto activity across multiple chains, including Ethereum and Solana. It attempted to hijack transactions by replacing wallet addresses inside network responses.

Luckily, the attackers made mistakes. The malicious updates caused crashes in CI/CD pipelines, which led to early detection. As a result, the attack failed with almost no victims. Still, it highlighted how fragile supply chains can be in the software world.

This incident shows just how dangerous supply chain compromises can be. Even one developer account being compromised can potentially expose millions of users. For crypto holders, it is another reminder that funds stored in hot wallets or exchanges are never completely safe.

As Guillemet explained: “If your funds sit in a software wallet or on an exchange, you’re one code execution away from losing everything.”

How to Stay Safe

There are steps everyone can take to protect themselves:

  • Always use a hardware wallet when possible. Hardware wallets like Ledger are built to keep private keys safe even if your computer is compromised.
  • Check every transaction before signing. Even with a hardware wallet, you should carefully read the wallet address, amount, and network before approving.
  • Beware of phishing emails. Most attacks begin with social engineering. Never click suspicious links or share credentials.
  • Use Clear Signing features. This lets you see exactly what you’re approving on your device screen, making it harder for attackers to trick you.
  • Stay updated. Keep an eye on official alerts from wallet providers and security researchers.

The immediate danger from this attack has passed, but the threat is not gone. Supply chain attacks remain one of the most powerful ways to deliver malware, and attackers are only getting more creative.

Read also: Here’s How XRP Price Can Hit $3.60 This Week

Subscribe to our YouTube channel for daily crypto updates, market insights, and expert analysis.

intelligent crypto
How are  regular people making returns of as much as 70% in a year with no risk?  By properly setting up a FREE Pionex grid bot - click the button to learn more.
Crypto arbitrage still works like a charm, if you do it right! Check out Alphador, leading crypto arbitrage bot to learn the best way of doing it.

Tags:

Petar Jovanović
Petar Jovanović

As the Head of Content at Captainaltcoin, I bring years of experience in the crypto industry. With a strong belief in the potential of the web3 market since 2017, I'm passionate about sharing valuable insights and knowledge. Feel free to connect with me on LinkedIn and let's discuss the exciting world of cryptocurrencies and decentralized technologies!

CaptainAltcoin
Logo