Supply chain attack: Solana web3.js library was infected with malicious code

Unknown attackers have equipped Solana's JavaScript SDK with malicious code to steal private keys.

listen Print view

(Image: Skorzewiak/Shutterstock.com)

2 min. read

Anyone who has recently downloaded the JavaScript SDK web3.js from Solana from the package manager npm may have picked up malicious code. The origin is probably a phishing attack on maintainers of the library.

In a report, security researchers from Socket state that versions 1.95.6 and 1.95.7 are affected. These versions contain code that collects private keys. This makes attacks on wallets with cryptocurrency possible.

The security researchers assume that the unknown attackers gained access to the SDK via social engineering attacks on maintainers and were thus able to modify it. This is a supply chain attack.

Videos by heise

In such attacks, it is not a target that is attacked directly, but software that then downloads a Trojan onto users' systems. If it is an SDK, as in this case, the software created with it also contains malicious code and the range of potential damage is multiplied.

Developers should now check whether they are using a vulnerable version of web3.js and remove any software created with it from circulation. The researchers explain how this can be done in their report. It is also advisable to reset private keys for security reasons.

The infected packages have now been removed from npm. The corrected version 1.95.8 is also available. The web3.js library is downloaded almost 350,000 times a week. It is not yet known how often this was the case with the malicious code-infected versions.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.