Solana Web3.js Library Backdoored in Supply Chain Attack

A supply chain attack compromised the Solana Web3.js library, exposing private keys and draining wallets. Major wallets reported no impact.

A significant security breach has occurred in the Solana ecosystem, where the popular Web3.js library was compromised in a supply chain attack. This incident allowed attackers to publish malicious versions of the library, potentially exposing users' private keys and draining their cryptocurrency wallets.

Key Takeaways

  • Two malicious versions of the Solana Web3.js library (1.95.6 and 1.95.7) were published.
  • The attack was made possible through a compromised GitHub account.
  • Developers are urged to update to version 1.95.8 immediately.
  • Major wallets like Phantom and Solflare reported no impact from the attack.

Overview of the Attack

The Solana Web3.js library, a crucial tool for developers building decentralized applications (dApps) on the Solana blockchain, was compromised on December 2, 2024. The malicious versions were available for download for approximately five hours, during which time they could have been accessed by unsuspecting developers. The compromised versions contained code designed to exfiltrate private keys, enabling attackers to drain funds from affected wallets.

Details of the Compromise

The attack was facilitated by a phishing incident that compromised a GitHub account with publish rights to the Web3.js library. The malicious code was embedded in the library's versions 1.95.6 and 1.95.7, which were downloaded over 400,000 times weekly. The malicious code specifically targeted developers and users who directly handled private keys, posing a significant risk to their cryptocurrency assets.

Response from Solana Developers

In response to the breach, the maintainers of the Solana Web3.js library released a clean version (1.95.8) and advised all developers who downloaded the compromised versions to:

  1. Update to version 1.95.8 immediately.
  2. Rotate any potentially compromised keys and account credentials.
  3. Consider their systems fully compromised and reset all secrets from a secure environment.

Impact on Users and Wallets

While the attack raised concerns about the security of the Solana ecosystem, major wallet providers such as Phantom and Solflare confirmed that they were not affected. Phantom's security team stated that they had not used the compromised versions of the library, ensuring their users' funds remained secure. Similarly, Solflare emphasized their rigorous code review processes to prevent such vulnerabilities.

Conclusion

This incident highlights the ongoing security challenges within the blockchain ecosystem, particularly regarding supply chain vulnerabilities. Developers are reminded to exercise caution when integrating third-party libraries and to stay vigilant against potential phishing attacks that could compromise their accounts. As the Solana community works to recover from this breach, the importance of robust security practices in the development of decentralized applications cannot be overstated.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

Data Lake for Web3 Analytics: Architecture and Pipelines
13.12.2025
[ Featured ]

Data Lake for Web3 Analytics: Architecture and Pipelines

Explore the architecture and pipelines for a data lake for Web3 analytics. Learn about ingestion, storage, and advanced analytics for blockchain data.
Read article
Labeling Pipeline for Crypto Security Data: Process and QA
13.12.2025
[ Featured ]

Labeling Pipeline for Crypto Security Data: Process and QA

Explore the crypto security data labeling pipeline: process, QA, and advanced techniques. Learn about data extraction, risk metrics, and integration for robust security.
Read article
ROC AUC for Crypto Risk Models: Interpreting Results
12.12.2025
[ Featured ]

ROC AUC for Crypto Risk Models: Interpreting Results

Understand ROC AUC for crypto risk models. Learn to interpret results, key metrics, and practical applications in DeFi security.
Read article