BTCC / BTCC Square / Cryptopolitan /
Did the NPM Supply Chain Attack Compromise Binance’s Customer Data or Assets?

Did the NPM Supply Chain Attack Compromise Binance’s Customer Data or Assets?

Published:
2025-09-09 11:27:12
19
1

SECURITY BREACH: NPM PACKAGE INFILTRATION SENDS SHOCKWAVES THROUGH CRYPTO SPACE

THE BINANCE CONNECTION

Exchange confirms zero customer fund exposure despite malicious dependency injection targeting developers. Internal security teams flagged suspicious activity within hours—standard protocol activated immediately.

BEYOND THE SURFACE

While user wallets remained untouched, the incident exposes deeper ecosystem vulnerabilities. Third-party tools remain crypto's Achilles' heel—because who needs hackers when dependencies do the work for them?

WAKE-UP CALL

Another day, another supply chain threat that somehow still surprises traditional finance dinosaurs. Their auditors would still be counting paper receipts while blockchain validators already mitigated the attack.

Supply chain attack on JavaScript packages scares crypto investors

The attack, which security researchers have called one of the largest in NPM’s history, took place on September 8. Hackers compromised the account of a trusted open-source maintainer known by the handle “qix,” also identified as Josh Junon. 

The attackers tricked Junon through a phishing email impersonating official communications from npmjs, the central repository for JavaScript packages. As seen in the fraudulent email, the perpetrators convinced Junon that his account WOULD be locked on September 10, 2025, unless he immediately updated his two-factor authentication credentials. 

“As part of our ongoing commitment to account security, we are requesting that all users update their Two-Factor Authentication (2FA) credentials. Our records indicate it has been over 12 months since your last 2FA update,” the email read.

Is Binance customer data, assets at risk after major supply chain attack?

The malicious email that set off one of the largest NPM attacks in history. Source: Aikido Security

Junon confirmed on X that he had fallen victim to the phishing scheme after another maintainer revealed his NPM account was “posting packages with backdoors,” which enabled attackers to hijack his account and push malicious updates to 18 popular Node.js libraries. 

The packages included chalk, debug, ansi-styles, and strip-ansi, all of which are embedded in the web.

Malicious code targets crypto transactions

According to analysis by Aikido Security, the attackers injected code into the compromised packages that allowed them to act as browser-based interceptors. The code was slipped into the index.js files, where it could hijack network traffic and application APIs in any application using the tainted packages.

The malicious script monitors for wallet addresses and transactions of major digital assets, including Bitcoin, Ethereum, Solana, Tron, Litecoin, and Bitcoin Cash. Once detected, the malware silently replaced the destination wallet address with one controlled by the attackers, redirecting funds without the victim’s knowledge.

As covered by Cryptopolitan yesterday, the chief technology officer at hardware wallet Maker Ledger, Charles Guillemet said the malicious code had already been propagated into packages with more than one billion downloads.

Blockchain analytics firm Arkham Intelligence reported late Monday that only $159 worth of cryptocurrency had been stolen so far. The stolen funds were traced to addresses identified in the original disclosures shared by Ledger’s security team. 

However, researchers believe the low figure does not mean there will be limited potential damage, given the billions of downloads associated with the compromised packages.

KEY Difference Wire helps crypto brands break through and dominate headlines fast

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users