Hackers Target dYdX Cryptocurrency Exchange by Lacing Open-Source Packages with Malware, Leaving Users' Wallets Vulnerable to Theft.
A series of malicious packages published on the npm and PyPI repositories have left users of the popular cryptocurrency exchange dYdX vulnerable to theft. Researchers from security firm Socket discovered that open-source packages containing the malicious code were laced with a function that stole wallet credentials from dYdX developers, backend systems, and in some cases, backdoored devices.
The compromised packages included version 3.4.1 of the @dydxprotocol/v4-client-js package on npm and the dydx-v4-client package on PyPI. The malware embedded a malicious function that exfiltrated wallet seed phrases, device fingerprints, and other sensitive information, allowing attackers to correlate stolen credentials across multiple compromises.
The malicious code also contained a remote access Trojan (RAT) that enabled execution of new malware on infected systems. Once installed, the RAT allowed attackers to execute arbitrary Python code with user privileges, steal SSH keys and API credentials, install persistent backdoors, exfiltrate sensitive files, monitor user activity, modify critical files, and pivot to other systems on the network.
This is at least the third time dYdX has been targeted by thieves. Previous incidents include a September 2022 uploading of malicious code to the npm repository and a 2024 DNS hijacking incident that commandedeered the dYdX v3 website through DNS spoofing, prompting users to sign transactions designed to drain their wallets.
The security firm warned users to carefully examine all apps for dependencies on the malicious packages listed above. "Viewed alongside the 2022 npm supply chain compromise and the 2024 DNS hijacking incident, this latest attack highlights a persistent pattern of adversaries targeting dYdX-related assets through trusted distribution channels," Socket said.
As a result, users are advised to take immediate action to protect themselves from potential theft, including:
* Reviewing all apps for dependencies on the malicious packages listed above
* Updating dependencies to version 1.0.31 or lower on npm and to 1.1.5post1 on PyPI
* Running security scans on devices and systems using dYdX-related assets
* Implementing additional security measures, such as multi-factor authentication and encryption
A series of malicious packages published on the npm and PyPI repositories have left users of the popular cryptocurrency exchange dYdX vulnerable to theft. Researchers from security firm Socket discovered that open-source packages containing the malicious code were laced with a function that stole wallet credentials from dYdX developers, backend systems, and in some cases, backdoored devices.
The compromised packages included version 3.4.1 of the @dydxprotocol/v4-client-js package on npm and the dydx-v4-client package on PyPI. The malware embedded a malicious function that exfiltrated wallet seed phrases, device fingerprints, and other sensitive information, allowing attackers to correlate stolen credentials across multiple compromises.
The malicious code also contained a remote access Trojan (RAT) that enabled execution of new malware on infected systems. Once installed, the RAT allowed attackers to execute arbitrary Python code with user privileges, steal SSH keys and API credentials, install persistent backdoors, exfiltrate sensitive files, monitor user activity, modify critical files, and pivot to other systems on the network.
This is at least the third time dYdX has been targeted by thieves. Previous incidents include a September 2022 uploading of malicious code to the npm repository and a 2024 DNS hijacking incident that commandedeered the dYdX v3 website through DNS spoofing, prompting users to sign transactions designed to drain their wallets.
The security firm warned users to carefully examine all apps for dependencies on the malicious packages listed above. "Viewed alongside the 2022 npm supply chain compromise and the 2024 DNS hijacking incident, this latest attack highlights a persistent pattern of adversaries targeting dYdX-related assets through trusted distribution channels," Socket said.
As a result, users are advised to take immediate action to protect themselves from potential theft, including:
* Reviewing all apps for dependencies on the malicious packages listed above
* Updating dependencies to version 1.0.31 or lower on npm and to 1.1.5post1 on PyPI
* Running security scans on devices and systems using dYdX-related assets
* Implementing additional security measures, such as multi-factor authentication and encryption