Sep 09, 2025 • Wiz Security Research
Widespread npm Supply Chain Attack: Breaking Down Impact & Scope Across Debug, Chalk, and Beyond
A widespread supply chain attack targeted the npm ecosystem, compromising popular packages including debug and chalk. The incident involved a wallet-hijacking...
Executive Summary
A widespread supply chain attack targeted the npm ecosystem, compromising popular packages including debug and chalk. The incident involved a wallet-hijacking browser interceptor designed to steal cryptocurrency assets. Telemetry from Wiz indicates a brief exposure window of approximately two hours, yet the prevalence of the affected packages reached 99% of environments, with a 10% malware presence rate. This highlights the significant risk posed by dependency confusion and compromised open-source libraries. The attack leveraged the trust inherent in widely used development tools to propagate malicious code rapidly. Organizations are advised to audit their npm dependencies immediately, implement lockfiles to prevent unauthorized updates, and monitor for unusual browser interceptor activity. Security teams should prioritize software composition analysis (SCA) tools to detect similar supply chain compromises early and mitigate potential financial losses associated with wallet hijacking campaigns targeting developers and end-users.
Summary
A deeper look at the npm debug/chalk supply-chain incident: deobfuscating the wallet-hijacking browser interceptor, quantifying the ~2-hour exposure with Wiz telemetry (~99% package prevalence, ~10% malware presence), and unpacking what made it spread so fast.
Published Analysis
A widespread supply chain attack targeted the npm ecosystem, compromising popular packages including debug and chalk. The incident involved a wallet-hijacking browser interceptor designed to steal cryptocurrency assets. Telemetry from Wiz indicates a brief exposure window of approximately two hours, yet the prevalence of the affected packages reached 99% of environments, with a 10% malware presence rate. This highlights the significant risk posed by dependency confusion and compromised open-source libraries. The attack leveraged the trust inherent in widely used development tools to propagate malicious code rapidly. Organizations are advised to audit their npm dependencies immediately, implement lockfiles to prevent unauthorized updates, and monitor for unusual browser interceptor activity. Security teams should prioritize software composition analysis (SCA) tools to detect similar supply chain compromises early and mitigate potential financial losses associated with wallet hijacking campaigns targeting developers and end-users. A deeper look at the npm debug/chalk supply-chain incident: deobfuscating the wallet-hijacking browser interceptor, quantifying the ~2-hour exposure with Wiz telemetry (~99% package prevalence, ~10% malware presence), and unpacking what made it spread so fast. A deeper look at the npm debug/chalk supply-chain incident: deobfuscating the wallet-hijacking browser interceptor, quantifying the ~2-hour exposure with Wiz telemetry (~99% package prevalence, ~10% malware presence), and unpacking what made it spread so fast.