Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»npm Package Lottie-Player Compromised in Supply Chain Attack
npm Package Lottie-Player Compromised in Supply Chain Attack
Security

npm Package Lottie-Player Compromised in Supply Chain Attack

February 27, 2026No Comments2 Mins Read

A targeted supply chain attack involving the widely used npm package @lottiefiles/lottie-player has been uncovered, highlighting vulnerabilities in software dependencies.

According to research published by ReversingLabs last week, malicious versions of the package were released earlier this year.

Key Details of the Incident

The @lottiefiles/lottie-player package was downloaded approximately 84,000 times weekly and is used to embed and play Lottie animations on websites.

While typically secure, malicious actors recently compromised the package by publishing three malicious versions – 2.0.5, 2.0.6 and 2.0.7 – via an unauthorized access token from a privileged developer account.

These malicious updates contained altered code that introduced pop-ups prompting users to connect their web3 wallets.

Upon connection, attackers gained access to drain victims’ crypto wallet assets. Developers quickly flagged the issue after noticing unusual behaviors on affected sites, prompting discussions across forums and GitHub.

Quick Response From Maintainers

LottieFiles responded promptly to the breach, working with npm to remove the malicious versions and publish a clean version based on the last secure release – version 2.0.4. Developers using the @latest dependency configuration received automatic updates, mitigating potential impacts.

Read more on supply chain security: CISA Urges Improvements in US Software Supply Chain Transparency

How the Compromise Was Detected

ReversingLabs researchers conducted a differential analysis between the secure 2.0.4 and the malicious 2.0.7 versions. This revealed significant changes, including:

  • Increased file size without functional justification

  • Introduction of URLs associated with Bitcoin exchanges

  • Removal of standard behaviors, like display enumeration

Their analysis also flagged threat-hunting policies that detected patterns similar to known software supply chain attacks, such as crypto-token detection.

See also  New Attacks Exploit VSCode Extensions and npm Packages

Lessons For Developers

The attack underscores the importance of pinning dependencies to specific, vetted versions to avoid vulnerabilities in auto-updated packages. Regular security assessments of dependencies and build pipelines are also crucial to identify potential risks.

“In the case of the @lottiefiles/lottie-player, the supply chain compromise was detected quickly. However, that doesn’t mean that malicious actors couldn’t work in the future towards being even more secretive and better at hiding their malicious code,” ReversingLabs warned.

“That’s why it’s necessary for developers to conduct security assessments that can verify the integrity and quality of public, open source libraries for safety before they are used.”

Source link

attack Chain compromised LottiePlayer npm Package Supply

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

Chilean Drug Trafficking Ring Was Also Mining Bitcoin: Report

September 24, 2023

Solana trading bot Aqua reportedly raking in $4.65 million after major ecosystem recommendations

February 2, 2026

Crypto News: AlphaPepe DeFi Exchange Progress Hits 1,000 Demo Users whilst Dogecoin Price Prediction Points To $1.00

April 26, 2026

Type above and press Enter to search. Press Esc to cancel.