Malicious Code Drama: Solana’s JavaScript Library Gets a Nasty Surprise!
Malware-poisoned versions of the JavaScript library @solana/web3.js were distributed via npm, exploiting a hijacked account to steal private keys and drain funds from Solana dapps. Two affected versions were removed, but damage was estimated at $130K. Non-custodial wallets are safe, but bots with private keys might be at risk.

Hot Take:
Looks like someone wanted to add a little extra “spice” to their JavaScript dish, but instead, they served up a malicious malware casserole! Who knew coding could be so… deliciously dangerous?
Key Points:
- A hijacked @solana account led to malware-infected versions of @solana/web3.js being distributed on npm.
- The compromised library versions could steal private key material and drain funds from dapps.
- Two specific versions (1.95.6 and 1.95.7) were affected for a brief period on December 3, 2024.
- Financial losses estimated at $130K, primarily affecting backend JavaScript bots with exposed private keys.
- A spear-phishing email is suspected as the initial entry point for the attack on the npm account.
Already a member? Log in here