[ccpw id="5"]

Home.forex news reportSecond JavaScript Exploit in Four Months Exposes Crypto Sites to Wallet Drainers

Second JavaScript Exploit in Four Months Exposes Crypto Sites to Wallet Drainers

-


A newly discovered loophole in one of the web’s most
used development tools is giving hackers a new way to drain cryptocurrency
wallets.

Cybersecurity researchers have reported a surge in
malicious code uploaded to legitimate websites through a vulnerability in the
popular JavaScript library React — a tool used by countless crypto platforms
for their front-end systems.

Crypto Drainer Attacks Surge via React Flaw

According to Security Alliance (SEAL), a nonprofit
cybersecurity organization, criminals are actively exploiting a recently
disclosed React vulnerability labeled CVE-2025-55182.

“We are observing a big uptick in drainers uploaded to
legitimate crypto websites through exploitation of the recent React CVE,” SEAL
stated on X (formerly Twitter). “All websites should review front-end code for
any suspicious assets NOW.

The flaw enables unauthenticated remote code
execution, allowing attackers to secretly inject wallet-draining scripts into
websites. The malicious code tricks users into approving fake transactions via
deceptive pop-ups or reward prompts.

Read more: Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads

SEAL cautioned that some compromised sites may be
unexpectedly flagged as phishing risks. The organization advised web
administrators to conduct immediate security audits to catch any injected
assets or obfuscated JavaScript.

“If your project is getting blocked, that may be the reason. Please review your code first before requesting phishing page warning removal.

The attack is targeting not only Web3 protocols! All websites are at risk. Users should exercise caution when signing ANY permit signature.”

Phishing Flags and Hidden Drainers

The group warned that developers who find their
projects mistakenly blocked as phishing pages should inspect their code first
before appealing the warning.

In September, a major software supply-chain attack infiltrated JavaScript packages, raising the risk that cryptocurrency users could be
exposed to theft.

The incident involved the compromise of a reputable
developer’s account on the Node Package Manager platform, allowing attackers to
distribute malicious code through packages that have been downloaded more than
one billion times.

“There’s a large-scale supply chain attack in
progress: the NPM account of a reputable developer has been compromised,”
Guillemet explained. “The affected packages have already been downloaded over 1
billion times, meaning the entire JavaScript ecosystem may be at risk.”

This article was written by Jared Kirui at www.financemagnates.com.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here

LATEST POSTS

Tesla Still Has America’s No. 1 EV

Despite a 23% decline in its U.S. sales to 39,800 in November, Tesla Inc. (NASDAQ:...

iRobot Files for Chapter 11 Amid Rising Competition and Tariff Pressures

iRobot is seeking bankruptcy protection, with plans to be purchased by its primary manufacturer. The company...

U.S. Homebuilder Confidence Inches Up In Line With Estimates In December

The National Association of Home Builders released a report on Monday showing a modest improvement by U.S. homebuilder confidence in the month of...

Client Challenge

Client Challenge ...

Follow us

0FansLike
0FollowersFollow
0SubscribersSubscribe

Most Popular

spot_img