Solana Web3.js Library Backdoored in Supply Chain Attack

A supply chain attack compromised the Solana Web3.js library, exposing private keys and draining wallets. Major wallets reported no impact.

A significant security breach has occurred in the Solana ecosystem, where the popular Web3.js library was compromised in a supply chain attack. This incident allowed attackers to publish malicious versions of the library, potentially exposing users' private keys and draining their cryptocurrency wallets.

Key Takeaways

  • Two malicious versions of the Solana Web3.js library (1.95.6 and 1.95.7) were published.
  • The attack was made possible through a compromised GitHub account.
  • Developers are urged to update to version 1.95.8 immediately.
  • Major wallets like Phantom and Solflare reported no impact from the attack.

Overview of the Attack

The Solana Web3.js library, a crucial tool for developers building decentralized applications (dApps) on the Solana blockchain, was compromised on December 2, 2024. The malicious versions were available for download for approximately five hours, during which time they could have been accessed by unsuspecting developers. The compromised versions contained code designed to exfiltrate private keys, enabling attackers to drain funds from affected wallets.

Details of the Compromise

The attack was facilitated by a phishing incident that compromised a GitHub account with publish rights to the Web3.js library. The malicious code was embedded in the library's versions 1.95.6 and 1.95.7, which were downloaded over 400,000 times weekly. The malicious code specifically targeted developers and users who directly handled private keys, posing a significant risk to their cryptocurrency assets.

Response from Solana Developers

In response to the breach, the maintainers of the Solana Web3.js library released a clean version (1.95.8) and advised all developers who downloaded the compromised versions to:

  1. Update to version 1.95.8 immediately.
  2. Rotate any potentially compromised keys and account credentials.
  3. Consider their systems fully compromised and reset all secrets from a secure environment.

Impact on Users and Wallets

While the attack raised concerns about the security of the Solana ecosystem, major wallet providers such as Phantom and Solflare confirmed that they were not affected. Phantom's security team stated that they had not used the compromised versions of the library, ensuring their users' funds remained secure. Similarly, Solflare emphasized their rigorous code review processes to prevent such vulnerabilities.

Conclusion

This incident highlights the ongoing security challenges within the blockchain ecosystem, particularly regarding supply chain vulnerabilities. Developers are reminded to exercise caution when integrating third-party libraries and to stay vigilant against potential phishing attacks that could compromise their accounts. As the Solana community works to recover from this breach, the importance of robust security practices in the development of decentralized applications cannot be overstated.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

Sandwich Attack Detection: MEV Signals
25.11.2025
[ Featured ]

Sandwich Attack Detection: MEV Signals

Learn about sandwich attack detection using MEV signals. Understand on-chain and ML approaches for identifying and mitigating these sophisticated threats.
Read article
Whale Movement Alerts for Crypto: Large Transfers
25.11.2025
[ Featured ]

Whale Movement Alerts for Crypto: Large Transfers

Stay informed with whale movement alerts crypto. Track large transfers, token swaps, and market impacts to refine your trading strategies.
Read article
Token Holder Concentration Analysis: Metrics and Limits
24.11.2025
[ Featured ]

Token Holder Concentration Analysis: Metrics and Limits

Analyze token holder concentration with key metrics like HHI & Gini. Learn to set limits for risk assessment in DeFi.
Read article