https://www.youtube.com/watch?v=R0M2TL7RARw

nostr:nprofile1qyvhwue69uhkyat8d4skutndva6hjtnwv46r5dpcxsuqz9nhwden5te0vfjhgcfwdehhxarjd9kzucmpd5qzqxvfqd89dw8kqmrjfaz6zt8gfggcg93p4tm3s2slv4jrszuugfmt74rjkj

🚨 Summary

A major security incident is unfolding involving npm (Node Package Manager), widely used in Bitcoin and cryptocurrency wallet software. A developer’s npm account was compromised, allowing malicious code to spread through the ecosystem.

🔑 What Happened

- A supply chain attack injected malicious code into npm packages used by many wallets.

- The code can silently replace crypto addresses during transactions with attacker-controlled ones.

- It doesn’t just substitute a random address—it chooses one visually similar to the intended recipient, making detection harder.

- Risk applies across multiple cryptocurrencies, not just Bitcoin.

🛠️ Impacted Wallets & Apps

Hardware wallets with npm-dependent companion apps:

Trezor (all models)

Ledger (Nano S, X, Stax)

BitBox02

Blockstream Jade

Keystone

BitKey

Hot/software wallets using npm:

Nunchuk

Blockstream Green

BlueWallet

Muun Wallet

Phoenix (only for on-chain, not Lightning)

Zeus (on-chain)

Exodus

Tangem app

🧭 Recommended Actions

1) Do not panic. If not actively transacting, funds are likely safe.

2) Verify all addresses carefully (not just first/last characters—check the full string).

3) Use hardware devices with a screen to confirm addresses before signing.

4) Avoid using compromised companion apps. Switch to Sparrow, Specter, Electrum, or Wasabi where possible.

5) Avoid BitKey and Tangem for now since they lack screens and require their own npm-dependent apps.

6) Hold off on non-urgent on-chain transactions until more clarity/patches emerge.

7) Lightning payments (invoices) appear unaffected.

Reply to this note

Please Login to reply.

Discussion

this is an attack vector for nsec signers too 🤔

not this incident but in theory for future

Bitkey, bluewallet publicly stated that their wallets were not a risk

Thanks for the update 🫡

Well fuck

When will patches come out? Will they be installed automatically?

nostr:nprofile1qqs09cclc7cn69067etl8af58ds599e8c7rgxaxkz2hwd7qkmvy6z4cppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qg4waehxw309aex2mrp0yhxgctdw4eju6t09ulu8qtv just a heads up 🫂

What is my luck 🫠

Thank you 🫂

This was a great summary. Thanks!

Though I’m listening to the whole thing too :)

I used the video transcript to write up a short summary with AI. Thought it'd be the most efficient way to get the message out.

Good News is: nostr:nprofile1qqs9xtvrphl7p8qnua0gk9zusft33lqjkqqr7cwkr6g8wusu0lle8jcpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgqghwaehxw309ahx7um5wgh8qctjv46x7tn5damkuaa68e2 wallet is safe!

#Bitcoin #npm #Hack

nostr:nevent1qqszmcat4zph582wa7pg229j9vd58dt493x4f8jdz78aheqswtngz3cmmucgf

Tangem stated on X their app / wallet is unaffected.

Thank you!

PSA - there is no mobile sparrow app, desktop only

The single point of failure of centralised software registries hs been exploited and failed by accident multiple times before.

This is why #golang uses DNS and git commits and locks the whole history of versions in the go.sum file. There could be malicious versions of some dependencies but go modules don't constantly push you to upgrade. Version tags are an exact commit and vulnerabilities are only exposed if you unwittingly upgrade to them. Most of the time this kind of issue can be worked around by patching or downgrading. But you can't control when users do this. Not so with NPM, who is constantly nagging you to upgrade yet again, and packages are not locked to git commits.

FYI, Nunchuk is unaffected. We don’t use Javascript or NPM.

https://primal.net/e/nevent1qqs04ag02shk3fw998vlrmp763psj6tne2umq6vctzlwd52vc4wvg6gu3wy3s

Thanks for the update 🫡

I don’t see any mention on either Ledger or Trezor websites 🤷‍♂️