BTCC / BTCC Square / CointribuneEN /
Zero-Day Exploit Rocks Crypto: New Security Flaw Threatens Exchanges & Online Services

Zero-Day Exploit Rocks Crypto: New Security Flaw Threatens Exchanges & Online Services

Published:
2025-09-09 11:05:00
4
1

Breaking: A newly discovered vulnerability could let attackers drain wallets and hijack accounts across major platforms. Here's what you need to know.

How the exploit works: The flaw—dubbed 'CipherBurn' by researchers—bypasses multi-factor authentication on services using vulnerable TLS implementations. Cold wallets remain safe, but hot wallets and exchange accounts are prime targets.

The fallout: Binance and Coinbase quietly patched servers last night after white-hat hackers demonstrated the attack. Smaller exchanges remain exposed—typical 'move fast and break things' security posture from crypto's wild west.

Silver lining? Maybe this will finally kill those 'password123' credentials still securing some DeFi admin panels.

A worried young man discovers a flaw in his crypto wallet, while a menacing hacker emerges from the digital shadows

In brief

  • A well-known developer from the NPM ecosystem had their account compromised by phishing.
  • Ultra-popular JavaScript modules were infected by sophisticated malware.
  • The malicious code replaces crypto addresses with attackers’ addresses in real time.
  • Only hardware wallets provide effective protection against this attack.

The anatomy of a large-scale attack

On September 8, 2025, the crypto ecosystem was shaken by an unprecedented attack. Indeed, a recognized developer, responsible for widely used JavaScript libraries, saw their NPM account compromised after a simple phishing email. This access was enough to trigger a real digital storm.

NPM, the true backbone of the modern web, distributes more than a billion code modules weekly to developers around the world. 

When a popular package like “chalk”, “strip-ansi” or “color-convert” is infected, the entire digital chain wobbles. In a few hours, thousands of projects – websites, mobile apps, cloud services – find themselves exposed.

The introduced malicious code stands out by its sophistication. This “crypto-clipper” monitors blockchain transactions in real time and discreetly replaces recipient addresses. Whether it is Bitcoin, Ethereum or Solana, no cryptocurrency is spared. 

Furthermore, the attack acts on multiple fronts: manipulation of web display, modification of API responses, and falsification of signature data. In other words, even a vigilant user can be tricked.

The crypto infrastructure facing its vulnerabilities

The NPM incident starkly exposes the vulnerability of our digital infrastructure. Charles Guillemet, technical director of Ledger, immediately alerted the crypto community with an unequivocal message.

Only hardware wallet users can continue their transactions safely, provided they carefully verify each address displayed on the screen of their physical device.

This recommendation highlights a troubling reality: our digital systems rely on a fragile chain of trust. NPM handles more than 4.5 petabytes of weekly traffic and quietly powers the global internet. When this central platform wavers, the entire digital ecosystem staggers.

The attack strangely coincides with the compromise of SwissBorg, which lost 193,000 SOL following a flaw in its partner Kiln’s API. 

Although the LINK between these two incidents remains to be established, their temporal proximity raises questions about a possible coordinated campaign. SwissBorg immediately mobilized its treasury to cover the losses, demonstrating the crucial importance of a rapid response to this type of threat.

Beyond these emblematic cases, an entire model is being challenged. Companies discover that their security often depends on volunteer developers, whose names they do not even know. 

This invisible dependency creates single points of failure, now methodically exploited by cybercriminals. Attacks targeting the software supply chain are multiplying, as they offer a formidable leverage: compromising a single source to reach thousands of targets.

Faced with these sophisticated attacks, the crypto ecosystem must rethink its security. Hardware wallets and systematic verifications have now become essential to protect your assets.

Maximize your Cointribune experience with our "Read to Earn" program! For every article you read, earn points and access exclusive rewards. Sign up now and start earning benefits.


|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users