Thieves Have Been Stealing Wallets from a Popular Crypto Exchange by Hacking Open-Source Packages on npm and PyPI.
The dYdX cryptocurrency exchange has been targeted by thieves once again, with malicious packages published on the open-source package repositories npm (Node Package Manager) and PyPI (Python Package Index) being used to steal wallet credentials and compromise user systems. Researchers from security firm Socket have identified several versions of popular packages that contain this malicious code.
The packages affected are version 3.4.1, 1.22.1, 1.15.2, and 1.0.31 of @dydxprotocol/v4-client-js on npm, as well as version 1.1.5post1 of dydx-v4-client on PyPI. When a developer uses these packages in their application, the malicious code exfiltrates sensitive information such as wallet credentials and device fingerprints.
These stolen credentials can be used to access users' wallets and drain their cryptocurrency balances. The attackers also set up remote-access Trojan (RAT) backdoors that allow them to execute new malware on infected systems. This means that once a user's system is compromised, the attackers can access sensitive information such as SSH keys, API credentials, and source code.
The incident highlights a persistent pattern of adversaries targeting dYdX-related assets through trusted distribution channels. The security firm says that anyone using the platform should carefully examine all apps for dependencies on these malicious packages listed above.
This is at least the third time dYdX has been targeted in attacks, following a September 2022 incident where malicious code was uploaded to npm and a DNS hijacking event in 2024 where users were redirected to a malicious site that drained their wallets. The attackers used official dYdX accounts to publish these packages, demonstrating the ease with which vulnerabilities can be exploited through trusted channels.
Users of dYdX should take immediate action to review all apps for dependencies on the affected packages and consider removing them until a fix is released.
The dYdX cryptocurrency exchange has been targeted by thieves once again, with malicious packages published on the open-source package repositories npm (Node Package Manager) and PyPI (Python Package Index) being used to steal wallet credentials and compromise user systems. Researchers from security firm Socket have identified several versions of popular packages that contain this malicious code.
The packages affected are version 3.4.1, 1.22.1, 1.15.2, and 1.0.31 of @dydxprotocol/v4-client-js on npm, as well as version 1.1.5post1 of dydx-v4-client on PyPI. When a developer uses these packages in their application, the malicious code exfiltrates sensitive information such as wallet credentials and device fingerprints.
These stolen credentials can be used to access users' wallets and drain their cryptocurrency balances. The attackers also set up remote-access Trojan (RAT) backdoors that allow them to execute new malware on infected systems. This means that once a user's system is compromised, the attackers can access sensitive information such as SSH keys, API credentials, and source code.
The incident highlights a persistent pattern of adversaries targeting dYdX-related assets through trusted distribution channels. The security firm says that anyone using the platform should carefully examine all apps for dependencies on these malicious packages listed above.
This is at least the third time dYdX has been targeted in attacks, following a September 2022 incident where malicious code was uploaded to npm and a DNS hijacking event in 2024 where users were redirected to a malicious site that drained their wallets. The attackers used official dYdX accounts to publish these packages, demonstrating the ease with which vulnerabilities can be exploited through trusted channels.
Users of dYdX should take immediate action to review all apps for dependencies on the affected packages and consider removing them until a fix is released.