A large-scale supply chain attack on the JavaScript ecosystem has prompted an urgent warning from Ledger’s chief technology officer, Charles Guillemet, who advised users without hardware wallets to avoid on-chain transactions until further notice. On September 8, hackers compromised the npm account of Josh Goldberg, a well-known open-source maintainer known as “Qix,” publishing malicious updates to 18 widely used packages, including chalk, debug, strip-ansi, and color-convert. These utilities underpin much of the modern web and collectively account for more than 2.6 billion weekly downloads, according to npm statistics. Researchers Uncover Crypto-Clipper Malware Hidden in Popular npm Libraries Security researchers quickly found that the new versions contained a “crypto-clipper” malware. The payload works by intercepting browser functions and swapping out legitimate cryptocurrency wallet addresses with attacker-controlled ones. In some cases, the malware actively hijacks wallet communications, modifying transactions before they are signed. The attack was first uncovered after a build error exposed obfuscated code hidden in one of the updated packages. Analysis showed that the malware employed a two-pronged strategy: passively replacing wallet addresses using sophisticated algorithms to mimic the look of real ones and actively intercepting transactions from browser-based wallets like MetaMask to redirect funds. The scale of the attack is unprecedented. Packages such as chalk are downloaded nearly 300 million times a week, while debug sees around 358 million weekly downloads. Collectively, the targeted libraries are embedded deep within the dependency trees of tools like Babel, ESLint, and countless other projects, raising concerns that the fallout could affect developers and users worldwide. In a post on X, Ledger CTO Charles Guillemet described the incident as a “large-scale supply chain attack” and warned that the malicious payload had already reached billions of downloads. “If you use a hardware wallet, pay attention to every transaction before signing and you’re safe,” he wrote. “If you don’t use a hardware wallet, refrain from making any on-chain transactions for now.” Guillemet added that it was still unclear whether the attackers were also attempting to steal wallet seed phrases. The attackers reportedly gained access through a phishing campaign that targeted npm maintainers with emails impersonating the platform’s support team. The fraudulent messages claimed that accounts would be locked unless two-factor authentication credentials were updated by September 10. Clicking the link redirected victims to a fake login page designed to steal credentials. Once in control of Goldberg’s account, the attackers pushed malicious versions of core packages used across millions of applications. Aikido Security, which analyzed the attack, said the injected code functioned as a browser-based interceptor capable of altering website content, tampering with API calls, and rewriting payment destinations without alerting users. npm has since removed many of the compromised versions, but security experts warn that transitive dependencies make it difficult to ensure complete protection. Developers are being urged to immediately audit their projects, pin safe versions of dependencies, and rebuild lockfiles. The attack shows the fragility of the open-source ecosystem, which relies heavily on trust between maintainers and developers. With billions of downloads affected and active wallet addresses linked to stolen funds already surfacing on-chain, researchers are describing the incident as one of the most severe supply chain compromises in the JavaScript ecosystem’s history. Crypto Hacks Surge Past $3B in 2025 as Phishing and Laundering Tactics Escalate The crypto sector is facing its most severe security crisis yet, with hackers stealing over $3 billion across 119 incidents in the first half of 2025, according to new data from blockchain analytics firm Global Ledger. The figure is one and a half times greater than total losses in 2024, placing the industry on track to break annual records. The report shows the speed of these attacks as a new threat. In some cases, stolen funds were moved within four seconds of an exploit, far faster than most exchange alert systems. Nearly 70% of hacks saw funds moved before the breach became public, while one in four had assets fully laundered before any statement or alert was issued. On average, it takes 37 hours for an incident to be publicly reported, leaving investigators trailing attackers who often cash out within minutes. Only 4.2% of stolen assets, around $126 million, were recovered in the first six months of the year. Recent incidents underline the scale of the problem. In July, hackers infiltrated Brazil’s national payment system through provider C&M Software, stealing about $180 million from reserve accounts and quickly routing funds through crypto exchanges. In June, hardware wallet maker Trezor warned of a phishing exploit that abused its customer support system to send fake emails requesting wallet backups. Around the same time, CoinMarketCap and Cointelegraph suffered front-end compromises that pushed phishing pop-ups and fake airdrop promotions to users. Despite the surge in attacks, bug bounty programs continue to show promise. Platforms like Immunefi report more than $120 million in payouts to white-hat hackers, preventing an estimated $25 billion in potential losses. But with laundering times now measured in seconds, analysts warn the industry’s defenses are struggling to keep paceA large-scale supply chain attack on the JavaScript ecosystem has prompted an urgent warning from Ledger’s chief technology officer, Charles Guillemet, who advised users without hardware wallets to avoid on-chain transactions until further notice. On September 8, hackers compromised the npm account of Josh Goldberg, a well-known open-source maintainer known as “Qix,” publishing malicious updates to 18 widely used packages, including chalk, debug, strip-ansi, and color-convert. These utilities underpin much of the modern web and collectively account for more than 2.6 billion weekly downloads, according to npm statistics. Researchers Uncover Crypto-Clipper Malware Hidden in Popular npm Libraries Security researchers quickly found that the new versions contained a “crypto-clipper” malware. The payload works by intercepting browser functions and swapping out legitimate cryptocurrency wallet addresses with attacker-controlled ones. In some cases, the malware actively hijacks wallet communications, modifying transactions before they are signed. The attack was first uncovered after a build error exposed obfuscated code hidden in one of the updated packages. Analysis showed that the malware employed a two-pronged strategy: passively replacing wallet addresses using sophisticated algorithms to mimic the look of real ones and actively intercepting transactions from browser-based wallets like MetaMask to redirect funds. The scale of the attack is unprecedented. Packages such as chalk are downloaded nearly 300 million times a week, while debug sees around 358 million weekly downloads. Collectively, the targeted libraries are embedded deep within the dependency trees of tools like Babel, ESLint, and countless other projects, raising concerns that the fallout could affect developers and users worldwide. In a post on X, Ledger CTO Charles Guillemet described the incident as a “large-scale supply chain attack” and warned that the malicious payload had already reached billions of downloads. “If you use a hardware wallet, pay attention to every transaction before signing and you’re safe,” he wrote. “If you don’t use a hardware wallet, refrain from making any on-chain transactions for now.” Guillemet added that it was still unclear whether the attackers were also attempting to steal wallet seed phrases. The attackers reportedly gained access through a phishing campaign that targeted npm maintainers with emails impersonating the platform’s support team. The fraudulent messages claimed that accounts would be locked unless two-factor authentication credentials were updated by September 10. Clicking the link redirected victims to a fake login page designed to steal credentials. Once in control of Goldberg’s account, the attackers pushed malicious versions of core packages used across millions of applications. Aikido Security, which analyzed the attack, said the injected code functioned as a browser-based interceptor capable of altering website content, tampering with API calls, and rewriting payment destinations without alerting users. npm has since removed many of the compromised versions, but security experts warn that transitive dependencies make it difficult to ensure complete protection. Developers are being urged to immediately audit their projects, pin safe versions of dependencies, and rebuild lockfiles. The attack shows the fragility of the open-source ecosystem, which relies heavily on trust between maintainers and developers. With billions of downloads affected and active wallet addresses linked to stolen funds already surfacing on-chain, researchers are describing the incident as one of the most severe supply chain compromises in the JavaScript ecosystem’s history. Crypto Hacks Surge Past $3B in 2025 as Phishing and Laundering Tactics Escalate The crypto sector is facing its most severe security crisis yet, with hackers stealing over $3 billion across 119 incidents in the first half of 2025, according to new data from blockchain analytics firm Global Ledger. The figure is one and a half times greater than total losses in 2024, placing the industry on track to break annual records. The report shows the speed of these attacks as a new threat. In some cases, stolen funds were moved within four seconds of an exploit, far faster than most exchange alert systems. Nearly 70% of hacks saw funds moved before the breach became public, while one in four had assets fully laundered before any statement or alert was issued. On average, it takes 37 hours for an incident to be publicly reported, leaving investigators trailing attackers who often cash out within minutes. Only 4.2% of stolen assets, around $126 million, were recovered in the first six months of the year. Recent incidents underline the scale of the problem. In July, hackers infiltrated Brazil’s national payment system through provider C&M Software, stealing about $180 million from reserve accounts and quickly routing funds through crypto exchanges. In June, hardware wallet maker Trezor warned of a phishing exploit that abused its customer support system to send fake emails requesting wallet backups. Around the same time, CoinMarketCap and Cointelegraph suffered front-end compromises that pushed phishing pop-ups and fake airdrop promotions to users. Despite the surge in attacks, bug bounty programs continue to show promise. Platforms like Immunefi report more than $120 million in payouts to white-hat hackers, preventing an estimated $25 billion in potential losses. But with laundering times now measured in seconds, analysts warn the industry’s defenses are struggling to keep pace

“Avoid On-Chain Transactions”: Ledger CTO Issues Urgent Warning After JavaScript Attack

5 min read

A large-scale supply chain attack on the JavaScript ecosystem has prompted an urgent warning from Ledger’s chief technology officer, Charles Guillemet, who advised users without hardware wallets to avoid on-chain transactions until further notice.

On September 8, hackers compromised the npm account of Josh Goldberg, a well-known open-source maintainer known as “Qix,” publishing malicious updates to 18 widely used packages, including chalk, debug, strip-ansi, and color-convert.

These utilities underpin much of the modern web and collectively account for more than 2.6 billion weekly downloads, according to npm statistics.

Security researchers quickly found that the new versions contained a “crypto-clipper” malware.

The payload works by intercepting browser functions and swapping out legitimate cryptocurrency wallet addresses with attacker-controlled ones.

In some cases, the malware actively hijacks wallet communications, modifying transactions before they are signed.

The attack was first uncovered after a build error exposed obfuscated code hidden in one of the updated packages.

Analysis showed that the malware employed a two-pronged strategy: passively replacing wallet addresses using sophisticated algorithms to mimic the look of real ones and actively intercepting transactions from browser-based wallets like MetaMask to redirect funds.

The scale of the attack is unprecedented. Packages such as chalk are downloaded nearly 300 million times a week, while debug sees around 358 million weekly downloads.

Collectively, the targeted libraries are embedded deep within the dependency trees of tools like Babel, ESLint, and countless other projects, raising concerns that the fallout could affect developers and users worldwide.

In a post on X, Ledger CTO Charles Guillemet described the incident as a “large-scale supply chain attack” and warned that the malicious payload had already reached billions of downloads.

“If you use a hardware wallet, pay attention to every transaction before signing and you’re safe,” he wrote.

“If you don’t use a hardware wallet, refrain from making any on-chain transactions for now.” Guillemet added that it was still unclear whether the attackers were also attempting to steal wallet seed phrases.

The attackers reportedly gained access through a phishing campaign that targeted npm maintainers with emails impersonating the platform’s support team.

The fraudulent messages claimed that accounts would be locked unless two-factor authentication credentials were updated by September 10. Clicking the link redirected victims to a fake login page designed to steal credentials.

Once in control of Goldberg’s account, the attackers pushed malicious versions of core packages used across millions of applications.

Aikido Security, which analyzed the attack, said the injected code functioned as a browser-based interceptor capable of altering website content, tampering with API calls, and rewriting payment destinations without alerting users.

npm has since removed many of the compromised versions, but security experts warn that transitive dependencies make it difficult to ensure complete protection.

Developers are being urged to immediately audit their projects, pin safe versions of dependencies, and rebuild lockfiles.

The attack shows the fragility of the open-source ecosystem, which relies heavily on trust between maintainers and developers.

With billions of downloads affected and active wallet addresses linked to stolen funds already surfacing on-chain, researchers are describing the incident as one of the most severe supply chain compromises in the JavaScript ecosystem’s history.

Crypto Hacks Surge Past $3B in 2025 as Phishing and Laundering Tactics Escalate

The crypto sector is facing its most severe security crisis yet, with hackers stealing over $3 billion across 119 incidents in the first half of 2025, according to new data from blockchain analytics firm Global Ledger.

The figure is one and a half times greater than total losses in 2024, placing the industry on track to break annual records.

The report shows the speed of these attacks as a new threat. In some cases, stolen funds were moved within four seconds of an exploit, far faster than most exchange alert systems.

Nearly 70% of hacks saw funds moved before the breach became public, while one in four had assets fully laundered before any statement or alert was issued.

On average, it takes 37 hours for an incident to be publicly reported, leaving investigators trailing attackers who often cash out within minutes. Only 4.2% of stolen assets, around $126 million, were recovered in the first six months of the year.

Recent incidents underline the scale of the problem. In July, hackers infiltrated Brazil’s national payment system through provider C&M Software, stealing about $180 million from reserve accounts and quickly routing funds through crypto exchanges.

In June, hardware wallet maker Trezor warned of a phishing exploit that abused its customer support system to send fake emails requesting wallet backups.

Around the same time, CoinMarketCap and Cointelegraph suffered front-end compromises that pushed phishing pop-ups and fake airdrop promotions to users.

Despite the surge in attacks, bug bounty programs continue to show promise. Platforms like Immunefi report more than $120 million in payouts to white-hat hackers, preventing an estimated $25 billion in potential losses.

But with laundering times now measured in seconds, analysts warn the industry’s defenses are struggling to keep pace.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Top NYC Book Publishing Companies

Top NYC Book Publishing Companies

New York City has been the epicenter of American publishing for generations, but “NYC publishing” isn’t just one lane. Today’s landscape includes two very different
Share
Techbullion2026/02/06 14:02
Sensorion Announces its Participation in the Association for Research in Otolaryngology ARO 49th Annual Midwinter Meeting

Sensorion Announces its Participation in the Association for Research in Otolaryngology ARO 49th Annual Midwinter Meeting

MONTPELLIER, France–(BUSINESS WIRE)–Regulatory News: Sensorion (FR0012596468 – ALSEN) a pioneering clinical-stage biotechnology company which specializes in the
Share
AI Journal2026/02/06 14:45
AI Crypto Trading Secrets: What They Won’t Tell You About Profits and Pitfalls|9-Figure Media

AI Crypto Trading Secrets: What They Won’t Tell You About Profits and Pitfalls|9-Figure Media

AI crypto trading is everywhere, and every YouTube guru claims their bot mints money while they sleep. Sounds dreamy, right? However, most don’t discuss the full story, the wild profits possible, and the lurking pitfalls. As someone obsessed with the intersection of artificial intelligence and digital assets, let me pull back the curtain on the realities of algorithmic trading in the crypto jungle. Here’s what nobody tells you: 87% of retail traders using automated systems lose money within their first year. The marketing materials show cherry-picked results. The testimonials come from paid affiliates. But here’s the twist. The remaining 13% who succeed aren’t just lucky. They understand something the majority misses entirely. The Reality Behind the Hype The crypto world loves success stories. You’ve probably seen them. “I made $50,000 in three months using this bot.” What they don’t mention? The $200,000 they lost by testing seventeen other systems first. Real talk: most trading algorithms fail because they’re built for perfect market conditions. Crypto markets are anything but perfect. Think about it like this. Would you trust a Formula 1 car to handle rush hour traffic? That’s essentially what most people do with their trading bots. Why Smart Money Uses Crypto AI Tools Differently Professional traders approach crypto AI tools with surgical precision. They don’t expect miracles. They expect consistent, measured results. The difference lies in understanding what these tools actually do well: • Risk management automation • Pattern recognition at scale • Emotional bias elimination • 24/7 market monitoring • Portfolio rebalancing Notice what’s missing from that list? Get-rich-quick schemes. The smartest crypto AI tools focus on protecting capital first. Profits come second. This mindset separates winners from losers. Here’s something interesting. 9-figure media companies track these patterns religiously. They know which crypto AI tools produce sustainable results versus flashy short-term gains. Professional traders using crypto AI tools typically target 15–25% annual returns. Not 500% monthly moonshots. The Startup Connection Most People Ignore AI for startups isn’t just about building the next ChatGPT. Many successful companies use AI to optimize their crypto treasury management. Smart startups integrate crypto AI tools into their financial operations early. They automate routine decisions. They reduce human error. They scale their trading operations without hiring armies of analysts. But here’s where it gets interesting. The best AI for startup applications in crypto aren’t the obvious ones. Consider automated tax reporting. Or real-time compliance monitoring. Or treasury optimization across multiple blockchains. These unsexy applications generate more consistent profits than flashy trading algorithms. AI for startups in the crypto space succeeds when it solves boring problems efficiently. Not when it promises unrealistic returns. The most successful AI for startups implementations focus on operational efficiency. They reduce costs. They minimize risks. They free up human resources for strategic decisions. Learning from Top AI Start-Ups Top AI start-ups in the crypto space share common characteristics. They prioritize transparency over marketing hype. Look at successful top AI start-ups like Chainalysis or Elliptic. They don’t promise easy money. They provide essential infrastructure. The best top AI start-ups focus on solving real problems: • Market data analysis • Security monitoring • Regulatory compliance • Portfolio analytics • Risk assessment These top AI start-ups understand something crucial. Sustainable businesses solve actual problems. They don’t just ride hype cycles. 9-figure media outlets consistently highlight these fundamental companies. They ignore the noise. They focus on substance. Many top AI start-ups actually discourage retail trading. They know the odds. They’ve seen the casualties. Instead, successful top AI start-ups build tools for institutions. Banks. Hedge funds. Companies with proper risk management systems. The Hidden Costs Nobody Discusses Using crypto AI tools costs more than subscription fees. Much more. First, there’s the learning curve. Most people spend months figuring out proper settings. During this time, they’re paying tuition to the market. Second, there’s infrastructure. Reliable crypto AI tools require stable internet, backup systems, and proper security measures. Third, there’s opportunity cost. Time spent tweaking algorithms could be spent learning fundamental analysis. The real cost? Most people using crypto AI tools trade more frequently. Increased trading usually means increased losses. Think about 9-figure media companies again. They understand that technology amplifies existing skills. It doesn’t replace them. Smart Implementation Strategies Successful crypto AI tools users follow specific patterns: • Start with paper trading • Use position sizing rules • Set strict stop losses • Monitor performance weekly • Adjust strategies quarterly They treat crypto AI tools like any other business tool. With respect. With caution. With realistic expectations, startup applications work similarly. They augment human decision-making. They don’t replace it. The most successful AI for startups implementations in crypto involve human oversight at every level. Algorithms suggest. Humans decide. What Actually Works Here’s what separates successful crypto AI tools users from everyone else: They focus on consistency over home runs. They understand that small, regular gains compound better than occasional big wins followed by devastating losses. They apply AI principles to their approach for startups. They iterate quickly. They fail fast. They learn constantly. They study top AI start-ups for inspiration. But they don’t try to replicate their exact strategies. Most importantly, they never risk money they can’t afford to lose. The crypto market will humble anyone. AI doesn’t change this fundamental truth. Your success with crypto AI tools depends more on your discipline than the sophistication of your algorithms. Remember: the house always has an edge. Your job is to find where that edge doesn’t apply. That’s the secret they won’t tell you. AI Crypto Trading Secrets: What They Won’t Tell You About Profits and Pitfalls|9-Figure Media was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story
Share
Medium2025/09/18 23:20