Security

Cyber-crime

LottieFiles supply chain attack exposes users to malicious crypto wallet drainer

A scary few Halloween hours for team behind hugely popular web plugin


LottieFiles is overcoming something of a Halloween fright after battling to regain control of a compromised developer account that was used to exploit users' crypto wallets.

Nattu Adnan, co-founder and CTO at LottieFiles – best known for its popular website animation plugin, LottiePlayer – confirmed on Thursday that a highly privileged developer had their account accessed via a stolen session token and attackers pushed malicious code to users.

He said that code appeared to be designed so that LottieFiles users would have their crypto wallets connected to the attacker's infrastructure, presumably to drain their assets.

Forum users were discussing their unusual findings when visiting sites that rely on LottiePlayer for animations. Upon visiting, they were served popups prompting them to connect their wallets.

The cybercriminal(s) behind the incident pushed three new versions of LottiePlayer (2.0.5, 2.0.6, 2.0.7) in the space of an hour to the npmjs package manager. They were the first changes to the project in two months.

Many of those whose websites were configured to use the latest version of LottiePlayer instead of a manually selected one had the malicious versions automatically served to users.

"On October 30th ~6:20 PM UTC – LottieFiles were notified that our popular open source npm package for the web player @lottiefiles/lottie-player had unauthorized new versions pushed with malicious code," Adnan wrote on the project's GitHub.

"This does not impact our dotlottie player and/or SaaS services. Our incident response plans were activated as a result. We apologize for this inconvenience and are committed to ensuring safety and security of our users, customers, their end-users, developers, and our employees."

He added that outside security experts were drafted in, the attacker was ejected, a safe version (2.0.8) was released, and the matter is considered resolved.

If for some reason a website admin isn't able to update to version 2.0.8 – a copy of the last safe version, 2.0.4, released in March – they're advised to communicate very clearly to customers that they should not be connecting their wallets when prompted.

"We have confirmed that our other open source libraries, open source code, GitHub repositories, and our SaaS were not affected."

Adnan didn't comment on the number of users affected by the incident, but to give a flavor of how popular LottiePlayer is, the project has 94,000 weekly downloads and has been downloaded more than 4 million times since its initial launch.

Again, the project hasn't officially confirmed this, but Web3 security platform Scam Sniffer spotted a transaction that it suggests shows one victim losing 10 Bitcoin ($722,508 at the time of writing) to the attack.

The incident is just the latest in a long line of noteworthy wallet-draining attacks over the past year. As recently as last month, we reported on a malicious Android app that drained victims' wallets of $70,000 in crypto assets, for example.

Be it through dodgy apps, supply chain attacks like the one that hit LottiePlayer, or exploiting the mechanics of smart contract-deployment opcode, cybercrooks are always looking for ways to make a quick buck.

Almost exactly a year ago, major crypto exchange Poloniex had $120 million in user assets drained from its reserves – an incident that occurred just days after the Monero Project was raided for just shy of half a million dollars. ®

Send us news
11 Comments

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Interpol nabs thousands, seizes millions in global cybercrime-busting op

Also, script kiddies still a threat, Tornado Cash is back, UK firms lose billions to avoidable attacks, and more

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

How Chinese insiders are stealing data scooped up by President Xi's national surveillance system

'It's a double-edged sword,' security researchers tell The Reg

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns