Hardware Wallet Screens May Be Only Defense in Historic Crypto Supply Chain Attack

Generated by AI AgentCoin World
Monday, Sep 8, 2025 3:03 pm ET1min read
BTC--
ETH--
SOL--
Aime RobotAime Summary

- Ledger CTO warns of critical supply chain attack exploiting widely used JavaScript package "error-ex" to steal crypto funds.

- Malware hijacks transactions by altering wallet addresses during Bitcoin/Ethereum/Solana transfers, deceiving users into approving thefts.

- Hardware wallet users can verify addresses on device screens, while software wallet users advised to avoid on-chain transactions until risks are resolved.

- Attack highlights vulnerabilities in open-source ecosystems, prompting calls for stronger security audits to prevent future breaches.

Ledger CTO Charles Guillemet has issued a warning to cryptocurrency users to exercise caution with onchain transactions following a critical supply chain attack. The breach, which involves the compromise of a widely used JavaScript package, has raised concerns about the security of crypto assets and the vulnerabilities inherent in open-source software ecosystems [1].

The compromised package, known as error-ex, has been downloaded over one billion times and is integrated into a vast array of applications and services. Hackers exploited the npm account of an unnamed but well-known developer to inject malicious code into this package. Once deployed, the malware silently monitors cryptocurrency activity. When a user attempts to send BitcoinBTC--, EthereumETH--, SolanaSOL--, or other tokens, the destination wallet is altered to an address controlled by the attackers. This manipulation could lead users to believe their funds are being sent to a trusted address, when in fact, the money is being redirected to malicious actors [1].

Security analysts have highlighted the multifaceted threat posed by the malware. The malicious code can hijack transactions at various levels, including altering website displays, modifying background processes, and deceiving users into signing transactions that do not reflect their actual intent [1]. This level of sophistication underscores the evolving tactics of cybercriminals in the crypto space.

Guillemet emphasized that hardware wallet users have a critical defense mechanism in the form of the device's screen, which displays the true recipient address. By carefully confirming each transaction on the device, users can detect tampering and prevent funds from being misdirected. However, for individuals relying solely on software wallets, Guillemet advised avoiding all on-chain transactions until the full scope of the attack is better understood [1].

Experts have labeled the breach as potentially the largest open-source supply chain attack in history. The incident not only highlights the vulnerabilities of shared software libraries but also exposes the direct financial risks they can introduce to the crypto ecosystem. Such breaches can erode trust in open-source infrastructure and prompt calls for stronger security protocols and audits in the development process [1].

The attack serves as a stark reminder of the importance of due diligence in software usage and the need for continuous monitoring of open-source dependencies. It underscores the growing necessity for both developers and users to remain vigilant and proactive in identifying and mitigating potential threats. As the situation continues to unfold, further analysis and updates from security firms and developers are expected [1].

Source:

[1] Critical hack may put crypto funds at risk: Ledger CTO (https://blockworks.co/news/critical-hack-may-put-crypto-funds-at-risk-ledger-cto)

Quickly understand the history and background of various well-known coins

Latest Articles

Stay ahead of the market.

Get curated U.S. market news, insights and key dates delivered to your inbox.