18 Popular Packages Compromised in One of the Largest NPM Supply Chain Attacks

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

At least 18 popular packages, including debug and chalk, which collectively account for over 2 billion weekly downloads, were compromised on possibly one of the largest npm supply chain attacks. The incident, which occurred on September 8, 2025, involved the injection of malicious code in npm packages after a maintainer's account was hijacked.

Phishing Attack Vector

The initial compromise was achieved through a targeted phishing attack on developers, according to Aikido Security research. The package maintainer received an email from a fraudulent domain, npmjs.help, which impersonated the official npm registry. 

The email falsely claimed that the maintainer's Two-Factor Authentication (2FA) credentials were out of date and threatened to lock the account if not updated. 

The phishing email
The phishing email | Source: Aikido Security

This tactic successfully coerced the developer into providing their credentials on a phishing site, giving the attackers access to publish malicious versions of highly used packages, which created turmoil among the cybersecurity community figures on LinkedIn.

The 18 very popular packages are:

Malicious Payload

This malware is essentially a browser-based interceptor that hijacks both network traffic and application APIs,” the report said. It injects itself into core functions like “fetch” and “XMLHttpRequest,” as well as wallet APIs for Ethereum, Solana, and other cryptocurrencies

Its primary function is to silently intercept and rewrite crypto wallet addresses in transactions, redirecting funds and approvals to attacker-controlled accounts. 

Cybersecurity Implications

The attack highlights the severe risks of credential phishing and the far-reaching impact of supply chain attacks within the software development ecosystem, potentially affecting millions of downstream projects and end-users.

In April, Atomic and Exodus wallets were compromised by a trojanized npm package posing as a PDF converter, while the North Korean Lazarus Group targeted developers with a new wave of malicious npm packages in March.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: