Skip to content

Commit a7ce6ca

Browse files
authored
Update software-supply-chain-attacks-crypto.md
1 parent 8c7493f commit a7ce6ca

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

software-supply-chain-attacks-crypto.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121,6 +121,20 @@ Ref: <https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/>
121121

122122
Ref: <https://x.com/r_cky0/status/1859656430888026524>
123123

124+
### @solana/web3.js attack (Dec 2024)
125+
126+
The @solana/web3.js package, which averages over 350,000 weekly downloads on npm, has been compromised with a backdoor.
127+
The goal is to leak private keys to a remote server.
128+
The root causes is social engineering/phishing attack targeting the maintainers of the library.
129+
130+
> According to Mert Mumtaz, CEO of Helius Labs, the damage from this attack is roughly $130K.
131+
> A fast response and detection by the Solana team was really important in making the download window of those versions to a minimum of 5 hours.
132+
133+
Ref:
134+
* <https://www.mend.io/blog/the-solana-web3-js-incident-another-wake-up-call-for-supply-chain-security/>
135+
* <<https://x.com/blockaid_/status/1864069590147277261>
136+
137+
124138
## Hardware attacks
125139

126140
It is possible to tamper with hardware devices used in crypto, typically a hardware wallet. Who would do that: an employee at the company that designed the wallet, the factory that produced it, and everyone involved in shipping it. Ref: <https://vitalik.ca/general/2021/01/11/recovery.html>. Such a real hardware supply chain attack has happened on Trezor wallets (2022): <https://www.kaspersky.com/blog/fake-trezor-hardware-crypto-wallet/48155/>

0 commit comments

Comments
 (0)