← Supply-Chain Attack Compendium

Copay

Incident Summary

Event-stream dependency compromised Copay wallet

The Copay Bitcoin wallet was pulled into the event-stream compromise through a malicious npm dependency. The injected code specifically recognized Copay workflows and attempted to steal wallet secrets, making a transitive JavaScript library the narrow blade against cryptocurrency users and their funds.

Date
2018-09-09 to 2018-11-26
Category
Commercial
Target Surface
Distribution
Insertion Phase
dependency
Impact
Cryptocurrency theft
Cause
Compromised dependency

What Was Affected

Package Copay
LanguageJavaScript
ComponentApplication
Artifact typebinary archive
Domain typeproject download host
Domain copay.io

Compromised Versions

  • 5.0.2
  • 5.1.0

Incident Context

Motive
Financial gain
Attribution
Individual Hacker
Transitive
Yes
User Impact
1000000
Observed Duration
78 days

Evidence

Compromised Artifacts

Current Artifacts and Analysis

Indicators and Changes

Hashes

  • sha256:005a6cfb72127d0007798d72700e28df0b5280b9f7e56f355de65a8f9107026e

Commits

External References

Source Data

Source record: proprietary/copay/meta.yaml