Malicious javascript compromise on npmjs.com

These packages, about a billion downloads prior

supports-hyperlinks
chalk-template
simple-swizzle
slice-ansi
error-ex
is-arrayish
wrap-ansi
backslash
color-string
color-convert
color
color-name

Thread follows.

Example change and download stats on one of the 12 packages changed, incident started about 2 hours ago.
Example copy of one of the inserted JS: https://pastebin.com/bwLZrq02
Malicious JS in NPM libraries - Pastebin.com

Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.

Pastebin
Just reported to NPM, they work on it.
derekheld (@[email protected])

A bunch of packages published by qix in NPM just got backdoored it looks like. Obfuscated code was added like two hours ago. #threatintel #npm

Infosec Exchange
It's a cryptocurrency wallet drainer, RIP a load of devops dudes crypto.
@GossiTheDog How do you drain a crypto wallet with JavaScript?
@mattb @GossiTheDog node is a platform for running javascript as a language on the host with system bindings, rather than in a sandboxed-to-domain browser context.
@dalias @mattb @GossiTheDog or it’s both. I only write it for in-browser use.

@mattb @GossiTheDog

Affected websites would largely run fine but if they were handling crypto transactions, the request is altered to the benefit of the attackers, sending funds to their wallet instead.

JavaScript let's you redefine standard features, and the malicious script redefines fetch, which is the standard function for calling URLs