Supply chain attacks targeting the JavaScript ecosystem are rapidly spreading to the Crypto Assets industry. Recently, cybersecurity company Aikido Security disclosed that a malware known as “Sandworm” has infected at least hundreds of software packages, with at least 10 closely related to crypto projects.
Researcher Charlie Erikson from Aikido Security stated on the company's blog on the 6th that more than 400 suspected infected packages have been confirmed. He emphasized that manually verifying the infection status one by one has minimized the false positive rate.
This supply chain attack spreads through the JavaScript package management platform NPM registry and is classified as self-replicating malware. It propagates by lurking in open-source software packages that ordinary developers download and use without suspicion, leading to rapid infection speed and wide-ranging impact. Notably, several packages related to the Crypto Assets community have been affected, many of which are popular modules with weekly download counts reaching tens of thousands.
Eriksen also issued a warning about infection risks on the X platform regarding the Ethereum Name Service on that day. He pointed out that some of the software packages used by ENS were also infected. As a core infrastructure providing Ethereum-based internet address services, ENS is adopted by numerous Crypto Assets projects and NFT markets.
Supply chain attacks do not directly target specific organizations but instead achieve indirect penetration by embedding malware into widely used development tools or libraries. This method of attack is difficult to detect and may pose a greater scale of harm, and the security industry remains highly vigilant about it. Given that most of the open-source Crypto Assets projects involved in this incident use third-party software packages, the tension in the entire market is intensifying.
Crypto Assets developers and enterprises expect to conduct security checks relying on external software packages due to this event, and strengthen security protocol measures. As of now, the specific scale of losses has not been clarified, but if it involves core service projects such as ENS, its impact may last for a while.
The article summary is provided by TokenPost.ai.
🔎 Market Interpretation
As open-source technology, which serves as the cornerstone of the open network ecosystem, becomes a source of hacker attacks, the vulnerabilities of decentralized technology are once again highlighted. If widely used software packages such as smart contracts or wallet backends become infected, it could pose a significant threat to the protection of user assets.
💡 Strategic Highlights
Check the dependency package list of each project and strengthen the manual verification process.
It is necessary to add security procedures when using external libraries with new code.
Conduct centralized vulnerability diagnostics on important infrastructures such as ENS.
📘 Terminology Explanation
Supply Chain Attack: A type of cyber attack that achieves indirect penetration by attacking the software or services required by the target rather than directly attacking the final target.
NPM: A widely used package management system in the JavaScript ecosystem, most web-based Crypto Assets projects adopt this system.
ENS: A system that converts complex Ethereum wallet addresses into human-readable domain names.
TP AI Precautions
This article uses the TokenPost.ai language model for article summarization, which may result in omissions of key content or discrepancies with the facts.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
The supply chain hacking attack through JavaScript packages is spreading... Crypto assets infrastructure such as ENS has also been infected.
Supply chain attacks targeting the JavaScript ecosystem are rapidly spreading to the Crypto Assets industry. Recently, cybersecurity company Aikido Security disclosed that a malware known as “Sandworm” has infected at least hundreds of software packages, with at least 10 closely related to crypto projects.
Researcher Charlie Erikson from Aikido Security stated on the company's blog on the 6th that more than 400 suspected infected packages have been confirmed. He emphasized that manually verifying the infection status one by one has minimized the false positive rate.
This supply chain attack spreads through the JavaScript package management platform NPM registry and is classified as self-replicating malware. It propagates by lurking in open-source software packages that ordinary developers download and use without suspicion, leading to rapid infection speed and wide-ranging impact. Notably, several packages related to the Crypto Assets community have been affected, many of which are popular modules with weekly download counts reaching tens of thousands.
Eriksen also issued a warning about infection risks on the X platform regarding the Ethereum Name Service on that day. He pointed out that some of the software packages used by ENS were also infected. As a core infrastructure providing Ethereum-based internet address services, ENS is adopted by numerous Crypto Assets projects and NFT markets.
Supply chain attacks do not directly target specific organizations but instead achieve indirect penetration by embedding malware into widely used development tools or libraries. This method of attack is difficult to detect and may pose a greater scale of harm, and the security industry remains highly vigilant about it. Given that most of the open-source Crypto Assets projects involved in this incident use third-party software packages, the tension in the entire market is intensifying.
Crypto Assets developers and enterprises expect to conduct security checks relying on external software packages due to this event, and strengthen security protocol measures. As of now, the specific scale of losses has not been clarified, but if it involves core service projects such as ENS, its impact may last for a while.
The article summary is provided by TokenPost.ai.
🔎 Market Interpretation
As open-source technology, which serves as the cornerstone of the open network ecosystem, becomes a source of hacker attacks, the vulnerabilities of decentralized technology are once again highlighted. If widely used software packages such as smart contracts or wallet backends become infected, it could pose a significant threat to the protection of user assets.
💡 Strategic Highlights
Check the dependency package list of each project and strengthen the manual verification process.
It is necessary to add security procedures when using external libraries with new code.
Conduct centralized vulnerability diagnostics on important infrastructures such as ENS.
📘 Terminology Explanation
Supply Chain Attack: A type of cyber attack that achieves indirect penetration by attacking the software or services required by the target rather than directly attacking the final target.
NPM: A widely used package management system in the JavaScript ecosystem, most web-based Crypto Assets projects adopt this system.
ENS: A system that converts complex Ethereum wallet addresses into human-readable domain names.
TP AI Precautions
This article uses the TokenPost.ai language model for article summarization, which may result in omissions of key content or discrepancies with the facts.