Crypto Wallets Drained: LottieFiles npm Package Hit by Malicious Attack
The npm package @lottiefiles/lottie-player was compromised, leading to crypto wallet theft. Malicious versions coaxed users into connecting their web3 wallets. Quick action removed the threat, but the incident underscores the need for vigilant dependency management. Remember: in software, as in life, trust—but verify!

Hot Take:
Who needs a horror movie when you have the suspense of software dependencies? It’s like a blockbuster thriller where npm packages are the damsels in distress, and cybercriminals are the villains who can’t resist a good heist. Grab your popcorn, folks, because the show is just getting started!
Key Points:
- The popular npm package @lottiefiles/lottie-player was compromised with malicious code.
- Three malicious versions (2.0.5, 2.0.6, 2.0.7) were distributed using a stolen developer access token.
- The attack aimed to siphon crypto wallet assets by prompting users to connect their web3 wallets.
- LottieFiles and npm quickly removed the compromised versions and reverted to a secure one.
- Developers are advised to pin dependencies to specific versions and conduct regular security assessments.
Already a member? Log in here
