Cryptic Daily logo

Cryptic Daily

News for markets, builders, and policy

NewsCrypto NewswireWeb3 BuilderWeb3 Fraud FilesAbout

Independent Crypto Journal

Cryptic
Daily

Daily reporting on crypto markets, builders, policy, and fraud without the noise floor most sites mistake for momentum.

XTelegramRSS

Explore

  • Home
  • News
  • Crypto Newswire
  • Web3 Builder

Categories

  • Crypto Newswire
  • Web3 Builder
  • Web3 Fraud Files

Company

  • About
  • Contact
  • Editorial Policy
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Advertise

© 2026 Cryptic Daily. All rights reserved.

Cryptocurrency prices are for informational purposes only. Not financial advice.

Home›Web3 Fraud Files›node-ipc Supply Chain Attack Hits npm De…
Web3 Fraud Files

node-ipc Supply Chain Attack Hits npm Developers

Berat Oshily

Berat Oshily

Editorial desk

in about 10 hoursUpdated May 17, 20267 min read
Share••LinkedIn•WhatsApp•Link

node-ipc became the center of a live npm security incident after three malicious package versions were published with credential-stealing code. The node-ipc supply chain attack matters because the package sits inside JavaScript build chains, where one poisoned dependency can expose cloud keys, private keys, CI/CD secrets and developer credentials.

node-ipc supply chain attack hit three npm versions Security researchers identified three malicious node-ipc releases on npm: 9.1.6, 9.2.3 and 12.0.1. SlowMist said its MistEye threat-intelligence system detected the anomalous releases on May 14, 2026,

and found that all three versions had roughly 80KB of obfuscated code appended to node-ipc.cjs, according to SlowMist’s technical analysis . Snyk also listed the same three versions as malicious and said public reporting indicates they were published on May 14, 2026, according to Snyk’s node-ipc advisory . Socket, StepSecurity and Datadog reached the same affected-version set, which makes this part of the incident unusually well-corroborated.

The affected package is not obscure. SlowMist said node-ipc had about 530,066 weekly downloads and more than 400 direct open-source dependents. Some other security firms cite higher download estimates depending on the time window and registry metric used. The safe editorial reading is simple: node-ipc is widely used enough that crypto teams should treat the incident as supply-chain exposure, not as a niche package problem.

The malicious payload targeted developer secrets The payload was not a prank or a harmless dependency mistake. Datadog said the compromised releases contained a backdoored CommonJS entry point that collected environment variables, host information, /etc/hosts, and many categories of developer, cloud, package-manager, source-control, Kubernetes, database and SSH credential files, according to Datadog Security Labs’ malware analysis . StepSecurity described the payload as obfuscated code designed to steal cloud credentials, SSH keys and CI/CD secrets, according to StepSecurity’s active supply-chain attack report . The Hacker News, citing Socket and StepSecurity, reported that the malware fingerprinted the host, read local files, compressed and chunked collected data, then attempted exfiltration through network logic tied to DNS and address selection in its May 14 report . This is why the incident belongs in Web3 Fraud Files . Crypto security risk does not begin only at the smart-contract layer. If a developer workstation or CI runner leaks .env files, private deployment keys, RPC credentials, exchange API secrets or wallet material, attackers can move from npm compromise to protocol compromise without touching an audited contract.

Runtime execution made the attack harder to spot The attack did not rely only on an install script. Datadog said the malicious block ran from the top level of node-ipc.cjs, and if a marker environment variable was not already set, it tried to fork the current module in a detached child process while returning control to the parent process. That design allowed normal package loading to continue while collection logic ran in the background. That execution path matters for incident response. A team may have installed the affected package without seeing a failed build, visible crash or suspicious postinstall output. If an application, tool or dependency path required node-ipc at runtime, the malicious code may have executed inside a developer machine, CI job or build container that had access to secrets. Snyk’s guidance says a lockfile match does not by itself prove execution, but it is enough to trigger an investigation if the package was installed in an environment where secrets were accessible. That is the right standard. Teams should not wait for proof of exfiltration before rotating exposed credentials. In supply-chain cases, the cost of delayed rotation can be much higher than the cost of a clean rebuild.

Crypto teams face a wider key-rotation problem The crypto-specific risk is that developer secrets often bridge into production systems. A normal web team may lose API keys, cloud credentials or deployment tokens. A crypto team may also expose deployer keys, multisig automation keys, RPC provider tokens, wallet seeds stored in unsafe files, exchange API keys, relayer credentials, custody workflows and signing-service access.

This makes the node-ipc incident relevant to Web3 Builder readers as much as fraud investigators. A builder team using JavaScript tooling should check whether node-ipc@9.1.6, node-ipc@9.2.3 or node-ipc@12.0.1 appeared in direct dependencies, transitive dependencies, local caches, CI caches or generated lockfiles. If one of those versions touched a machine with secrets, the safest response is credential rotation, not only package removal. Snyk recommends checking dependency trees and lockfiles, pinning to known safe versions, refreshing lockfiles, clearing local and CI package caches, and rebuilding artifacts from clean dependency trees. Datadog’s analysis supports the same operational logic: because the payload looked for many secret classes, teams should assume broad credential exposure until logs, build history and affected machines are reviewed.

Maintainer-account abuse appears to be the strongest lead Public reporting points toward abuse of a maintainer identity with npm publish rights rather than a proven compromise of the npm registry itself. The Hacker News reported that the malicious versions were published by an account named atiertant, which appeared in the maintainer list but had no prior publish history for node-ipc, while the original author was identified as riaevangelist. Snyk described a possible expired-domain recovery path as an attribution lead: public reports suggested that an expired maintainer email domain may have been re-registered before the attack, potentially allowing account recovery abuse. Snyk also cautioned that this remains a lead rather than complete proof. That distinction matters. The confirmed facts are the malicious versions, the payload behavior and the account used to publish. The exact account-takeover path still needs final confirmation.

The case is still a warning for open-source package governance. Dormant maintainers, old email domains, broad publish rights and weak account recovery controls can create a path from administrative drift to malware distribution. Package owners need enforced two-factor authentication, active maintainer review, domain-expiry monitoring, publish provenance and alerting when an inactive account suddenly ships high-risk releases.

What developers should do after installing node-ipc The first step is identification. Teams should search package-lock.json, npm-shrinkwrap.json, yarn.lock, pnpm-lock.yaml, build logs and package caches for node-ipc versions 9.1.6, 9.2.3 and 12.0.1. They should also inspect container images, CI runners and developer machines that built code on or after May 14, 2026. The second step is containment. Remove the malicious versions, pin to a known clean version, clear npm and CI caches, rebuild from clean dependency trees, and rotate any credentials that were available to the affected environment. That includes cloud keys, SSH keys, GitHub tokens, npm tokens, database

credentials, RPC provider keys, deployment secrets, exchange API keys, wallet-related files and any .env content that could grant production access. The third step is monitoring. Teams should review DNS logs, outbound connections, process history and any unusual child Node.js processes created during the exposure window. Datadog’s analysis of DNS-based exfiltration behavior makes network telemetry especially useful, while Snyk’s advisory gives dependency-checking commands for teams that need a fast first pass.

The next concrete signal is whether npm, the package maintainers or security researchers publish a final account-takeover timeline and confirm whether any other packages tied to the same maintainer account were affected. Until then, crypto teams should treat affected node-ipc installs as potential credential exposure and rotate secrets from any environment that loaded the malicious package.

This article is for informational purposes only and does not constitute financial or investment advice. ╗

Reference Desk

Sources & References

5 Linked
  • 01SlowMistslowmist.medium.com↗
  • 02Snyksnyk.io↗
  • 03StepSecuritystepsecurity.io↗
  • 04Datadog Security Labssecuritylabs.datadoghq.com↗
  • 05The Hacker Newsthehackernews.com↗
Berat Oshily
SocialFollow on X
Berat Oshily
Web3 & NFT Correspondent

Berat Oshily has spent the last ten years deep in the weeds of crypto security not from the sidelines, but hands-on, working contracts, breaking systems, and figuring out exactly where things go wrong. Based in Birmingham, he focuses on Web3 fraud: the scams, the exploits, the rug pulls, and the smart contract vulnerabilities that cost real people real money. He knows how attackers think because he has spent years testing the same systems they target. Beyond the technical work, Berat has a knack for making complicated on-chain fraud understandable whether he's talking to security professionals or someone who just lost funds to a phishing link. You'll often find him at blockchain conferences across the UK and Europe, sharing what he knows.

Continue Reading

Related Articles

Additional reporting and adjacent stories connected to this topic.

3 Picks
Web3 Fraud Files
7 min read

in about 13 hours

Adshares Bounty Claim Needs Proof After $628K Hack

Adshares’ reported bridge exploit has moved into a recovery phase, but public evidence for a 10% bounty offer still needs official confirmation. The case shows why exploit recovery claims need the same verification standard as attack reports.

Zashleen Singh
Zashleen Singh
in about 13 hours
Web3 Fraud Files
7 min read

in about 13 hours

NBI Crypto Scam Raid: 15 Arrested in Mandaluyong

Philippine investigators arrested 15 people in Mandaluyong after raiding an alleged crypto investment scam hub using a spoofed website. The case shows how organized fraud desks package crypto promises through social engineering and forged digital systems.

Berat Oshily
Berat Oshily
in about 13 hours
Web3 Fraud Files
6 min read

in about 12 hours

Ripple CTO Scam Warning Targets Fake XRP Giveaways

Ripple CTO David Schwartz warned XRP users that fake airdrops, giveaway posts and impersonator accounts have surged across social platforms. The alert puts wallet-drainer risk back at the center of XRP Ledger user security.

Zashleen Singh
Zashleen Singh
in about 12 hours
Trending Desk
Live
01

Adshares Bounty Claim Needs Proof After $628K Hack

02

NBI Crypto Scam Raid: 15 Arrested in Mandaluyong

03

Ripple CTO Scam Warning Targets Fake XRP Giveaways

04

Pi Network Scam Warning Targets Fake Founder Accounts

05

DarkSword iOS Leak Puts Crypto Wallet Holders at Risk

Browse latest coverage