NPM Worm Attack Hits 400+ Crypto Packages
Over 400 NPM packages, including ENS and crypto libraries, were targeted by a worm-style attack stealing wallet keys and dev credentials.

- Over 400 NPM packages infected by a malicious worm
- ENS and crypto libraries among the affected
- Attackers stole wallet keys and developer credentials
In a significant security incident, more than 400 NPM packages have been compromised by a sophisticated worm-style attack. The breach affected numerous key crypto-related libraries, including those connected to the Ethereum Name Service (ENS), sending shockwaves across the blockchain developer community.
According to initial reports, the worm infiltrated the packages and silently stole sensitive data such as wallet private keys and developer credentials. This method of attack is especially dangerous as it spreads from one package to another, increasing its reach with every compromised dependency.
Key Crypto Libraries Compromised
Some of the impacted packages include vital libraries used by developers building on Ethereum and other blockchain networks. This includes packages related to ENS, a widely used decentralized domain service on Ethereum. These libraries are often integrated deep within larger projects, making the worm’s reach extensive and dangerous.
The attack highlights vulnerabilities in software supply chains, especially when developers rely on open-source packages without rigorous audits. Once a developer installs an infected package, their credentials and wallet data could be silently exfiltrated, putting both personal and project assets at risk.
What Developers Should Do Now
Security experts recommend that all developers using NPM, especially in Web3 or crypto-related projects, conduct immediate audits of their dependencies. Here are some steps to take:
- Check for recent updates to any packages related to ENS or wallet functionality.
- Review NPM package maintainers and verify the integrity of packages you depend on.
- Rotate developer credentials and regenerate any wallet keys that may have been exposed.
- Use security tools that monitor for malicious behavior in dependencies.
This incident serves as a stark reminder that even trusted package ecosystems like NPM can be vectors for large-scale attacks. Vigilance and quick action are crucial in minimizing damage and preventing future compromises.



