A sophisticated malware campaign has struck the dYdX cryptocurrency exchange, leaving users' wallets vulnerable to theft. The malicious packages, published on both npm and PyPI repositories, contain code that steals wallet credentials from developers and backend systems, as well as backdoors that allow attackers to remotely access infected devices.
Researchers at security firm Socket have discovered that the malware was embedded in open-source packages published on these platforms. When a seed phrase used for wallet security is processed, the malicious function exfiltrates it, along with a fingerprint of the device running the app. This information allows the threat actor to track victims across multiple compromises.
The affected packages include versions 3.4.1 and 1.22.1 of the @dydxprotocol/v4-client-js library on npm, as well as version 1.1.5post1 of the dydx-v4-client package on PyPI. The malware also implements a remote access Trojan (RAT) that allows the execution of new malware on infected systems.
The incident is at least the third time dYdX has been targeted in attacks, with previous events including a September 2022 uploading of malicious code to the npm repository and a 2024 DNS hijacking incident. Users of the platform are advised to carefully examine all apps for dependencies on the listed malicious packages.
As Socket noted, this latest attack highlights a persistent pattern of adversaries targeting dYdX-related assets through trusted distribution channels. The use of compromised official accounts to publish malicious packages underscores the importance of vigilance and careful app review in preventing such attacks.
Researchers at security firm Socket have discovered that the malware was embedded in open-source packages published on these platforms. When a seed phrase used for wallet security is processed, the malicious function exfiltrates it, along with a fingerprint of the device running the app. This information allows the threat actor to track victims across multiple compromises.
The affected packages include versions 3.4.1 and 1.22.1 of the @dydxprotocol/v4-client-js library on npm, as well as version 1.1.5post1 of the dydx-v4-client package on PyPI. The malware also implements a remote access Trojan (RAT) that allows the execution of new malware on infected systems.
The incident is at least the third time dYdX has been targeted in attacks, with previous events including a September 2022 uploading of malicious code to the npm repository and a 2024 DNS hijacking incident. Users of the platform are advised to carefully examine all apps for dependencies on the listed malicious packages.
As Socket noted, this latest attack highlights a persistent pattern of adversaries targeting dYdX-related assets through trusted distribution channels. The use of compromised official accounts to publish malicious packages underscores the importance of vigilance and careful app review in preventing such attacks.