FOMO DailyFOMO DailyFOMO Daily
Font ResizerAa
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Reading: Malicious Worm Hits Crypto Domains: What You Need To Know
Share
Font ResizerAa
FOMO DailyFOMO Daily
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Search
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Copyright © 2026 FOMO Daily - All Rights Reserved.

Malicious Worm Hits Crypto Domains: What You Need To Know

Malicious worm crypto supply chain attack explained

Oscar Harding
Last updated: November 25, 2025 8:06 pm
Oscar Harding
8 Min Read
Share
8 Min Read

A new malicious worm has shaken the software world, and its impact has stretched all the way into crypto related domains. The attack started as a supply-chain intrusion targeting npm packages, but because so many Web3 tools depend on JavaScript libraries, the worm’s effects quickly spilled into the crypto ecosystem. In simple terms, a worm called Shai-Hulud slipped into popular npm packages, spread through developer environments, stole secrets like tokens and API keys, and even attempted to publish new infected versions of other packages. What makes this attack so concerning is how quietly it moved and how deeply it reached into key software used by crypto teams and domain services.

The latest wave of this worm was detected on November 24 when security researchers from Aikido noticed odd behavior inside Async API packages on npm. This discovery opened a trail that revealed something much bigger: more than 490 infected npm packages tied to the worm, together responsible for over 132 million monthly downloads. Many of the compromised libraries connect to tools used by Web3 developers, such as ENS domain integrations, automation platforms like Zapier, and SDKs that underpin crypto dashboards or APIs. Even though the worm was not directly targeting blockchains, its presence in the supply chain meant it had the power to affect any service depending on these libraries including crypto domain managers and related infrastructure.

So how did this worm actually work? The process was surprisingly simple and incredibly sneaky. When a developer installed one of the infected packages, the worm automatically installed Bun, a JavaScript runtime similar to Node.js. That might not sound suspicious—lots of developers experiment with Bun but here it was used to run hidden malicious scripts. Those scripts scanned the user’s system for secrets, looked for API keys, and tried to gather GitHub and npm credentials. To make matters worse, the worm used TruffleHog, a legitimate open-source security tool normally used to find leaked credentials. In this case, TruffleHog was turned into a weapon that searched every corner of a developer’s machine for anything valuable.

Once the worm gathered sensitive credentials, it pushed the stolen data to random public GitHub repositories controlled by the attacker. Earlier versions of the worm used predictable repo names; this time, everything was randomized, making tracking and cleanup significantly harder. With stolen tokens in hand, the worm then tried to publish more infected packages, targeting up to 100 additional projects per compromised machine, dramatically increasing its reach. The result was a fast-spreading, self-replicating attack capable of hitting huge parts of the software ecosystem with almost no noise.

What shocked researchers most was a destructive feature buried inside this new wave. If the worm failed to authenticate using any stolen credentials meaning it couldn’t spread further it activated a failsafe designed to wipe all files in the user’s home directory. For developers, this could mean losing code, losing configuration data, losing private keys stored locally, and potentially losing entire environments if backups weren’t in place. This turned what might have been “just” a data-theft worm into something far more dangerous for anyone working in crypto or software development.

The list of affected ecosystems highlights how wide the blast radius truly was. Async API packages were among the first discovered, but PostHog analytics tools, Postman-related packages, Zapier-linked modules, and other developer utilities were also infected. Some of these tools tie directly or indirectly into crypto project dashboards, wallet automation systems, domain management flows, and Web3 APIs. That’s why crypto domains ended up being part of the story not because blockchains were hacked, but because the tools connected to crypto services were caught in the supply-chain web.

For anyone working in Web3 or managing crypto domains, this attack is a serious reminder that security risks don’t only come from smart contracts or on-chain logic. They also come from the everyday libraries we install, the CI pipelines we trust, and the automation tools we depend on to keep our projects running. If an attacker can compromise the software that builds or manages your project, they don’t need to attack the blockchain itself they can attack everything around it.

If you’re wondering whether you might have been affected, there are a few signs worth checking. Unexpected installations of Bun, suspicious GitHub repositories appearing under your account, weird npm package updates you don’t remember making, or modified lockfiles that reference compromised package versions can all be warning flags. Even if nothing looks obviously wrong, teams who were using Async API, PostHog, Postman packages, or Zapier integrations during the attack window should treat this situation seriously.

Security experts recommend that teams immediately rotate critical credentials GitHub tokens, npm tokens, API keys, and cloud credentials. These are exactly the types of sensitive items the worm was looking for, and rotating them cuts off the attacker’s access. You should also audit your GitHub organization to remove suspicious repositories or collaborators, review your lockfiles to ensure you are not using compromised package versions, and clear CI/CD caches that may contain malicious artifacts. For peace of mind, it helps to scan your environment for any remaining worm components and reset any tools that might have been touched.

Beyond the immediate cleanup, there’s a bigger lesson here. Supply chain attacks like this one are becoming more common because they offer attackers a powerful shortcut. Instead of hacking one company at a time, they infect the libraries everyone relies on. For Web3 teams, this means embracing the idea that security isn’t just about protecting wallets or smart contracts. It’s about protecting the entire development pipeline from the dependencies you install to the secrets you store in your environment. Adding dependency controls, monitoring install-time behavior, scanning for leaked secrets, and regularly rotating credentials aren’t optional anymore. They’re essential best practices.

In the end, the Shai-Hulud worm is a warning, not a final disaster. Its ability to spread silently through npm, steal secrets, and potentially wipe developer machines shows just how fragile parts of our software ecosystem can be. But it also gives teams the chance to strengthen their systems now rather than later. Crypto projects, domain services, and Web3 developers need to treat this as a wake-up call to build stronger, more resilient setups before the next supply-chain attack arrives.

Senate Agriculture Committee Advances Historic Crypto Regulation Bill
XRP Currently Dominates Japan’s Cash Inflows And a New 20 Percent Tax Rate Is About to Lock That Advantage In
Inside trades in Washington: stop the self-dealing now!
Major Banks Now Own Bitcoin’s Market Plumbing and They’re Influencing Price Action
Why Tether’s Gold and Bitcoin Mix Alarms S&P but Reassures the Crypto Market

Sign up to FOMO Daily

Get the latest breaking news & weekly roundup, delivered straight to your inbox.

By signing up, you acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Reddit Telegram Threads Bluesky Email Copy Link Print
ByOscar Harding
G'day I’m Oscar Harding, a Australia based crypto / web3 blogger / Summary writer and NFT artist. “Boomer in the blockchain.” I break down Web3 in plain English and make art in pencil, watercolour, Illustrator, AI, and animation. Off-chain: into  combat sports, gold panning, cycling and fishing. If I don’t know it, I’ll dig in research, verify, and ask. Here to learn, share, and help onboard the next wave.
Previous Article Solana Turns to Scarcity as 80% of Supply Sits in Red
Next Article Cardano Split in Two by a Single Transaction – What It Means for ETH and SOL

Latest News

Bitcoin Breaking Below 63K Signals Crypto Winter Lingers
Finance Opinion Politics
Australia’s New Hate Speech Laws and the Battle Over Free Expression
Free Speech News Opinion Politics
Meta’s Big Stablecoin Comeback and a Potential $1 Trillion Treasury Shift
Finance News Opinion social media
Ethereum Faces Market Turmoil as Buterin Selling and Foundation Staking Cause Panic
War News
Trump’s 2026 State of the Union: A Deeply Divided Vision of America
News Opinion Politics
XRP ETF Inflows Collapse 93% as Price Capitulates
Cryptocurrency Finance News
Brazil Removes Bitcoin Miner Import Duty and Opens Solar Energy Opportunity
War News
Bitcoin Could Rebound Fast as Trillions in Sidelined Funds Look for Opportunity
Finance News
Bitcoin Miner Bitdeer Dumps Entire BTC Holdings as Margin Pressure Intensifies
Cryptocurrency Finance News
Epstein Files, Royal Fallout and the Andrew Mountbatten-Windsor Controversy
News Opinion Politics UK
California, Youth, and the Online Age: A Turning Point in Social Media Policy
International Crypto News News Politics USA News
Why Bitcoin Miner Stress Could Signal a Bullish Trend Ahead
War News
Trump Linked Stablecoin Under Pressure as WLFI Faces Market Volatility
Finance International Crypto News Opinion Politics
India Studies US Tariff Changes and What It Means for Trade
Business Finance News

You Might Also Like

OpenAI to allow adult erotica in ChatGPT, with strict safeguards

October 20, 2025

Robinhood Is Constructing a Regional Triangle That Unlocks the One Thing U.S. Regulators Won’t Permit

December 15, 2025

Solana’s Crypto Shift: From Meme Madness to Market Predictions

December 2, 2025

Eric Trump Bitmain crypto deal sparks U.S. concerns

October 17, 2025

FOMO Daily — delivering the stories, trends, and insights you can’t afford to miss.

We cut through the noise to bring you what’s shaping conversations, driving culture, and defining today — all in one quick, daily read.

  • Privacy Policy
  • Contact
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency

Subscribe to our newsletter to get the latest articles delivered to your inbox.

FOMO DailyFOMO Daily
Follow US
Copyright © 2026 FOMO Daily. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?