Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Malicious Packages Drain dYdX Wallets

Image © Arstechnica
Security researchers have found npm and PyPI packages tied to dYdX were compromised, exfiltrating seed phrases and device fingerprints.

Security researchers have found that open-source packages published on npm and PyPI for the dYdX ecosystem were altered to include code that steals wallet credentials from developers and backend systems, and in some cases backdoors devices.

Infected packages include npm’s @dydxprotocol/v4-client-js (versions 3.4.1, 1.22.1, 1.15.2, 1.0.31) and PyPI’s dydx-v4-client (1.1.5post1).

The malware was embedded in legitimate packages. When a seed phrase is processed, the code exfiltrates it along with a device fingerprint to a domain that mimics the legitimate dYdX site, dydx.priceoracle.site, via typosquatting.

The fingerprint enables attackers to correlate stolen credentials across victims and compromises, threatening any application that depends on the compromised versions and exposing both developers testing with real credentials and production end users to wallet theft.

Socket notes the incident is at least the third targeting of dYdX, following a 2022 npm supply-chain breach and a 2024 DNS hijack that redirected users to a malicious site attempting to sign transactions. The researchers warned that the attack demonstrates a persistent pattern of adversaries abusing trusted distribution channels to reach JavaScript and Python developers. Users are urged to audit dependencies and remove affected versions.

 

Arstechnica

Related News

KadNap: Takedown-Resistant Router Botnet Uncovered
Weather and Super Bowl Drive Churn Risk
Twin Valley Invests $12.3M in Kansas
Gulf Conflict Could Slow U.S. Data Center Boom
Debra Freitas Named to Inc.'s 2026 Female Founders 500
Ritter-ESA St Jude Fundraiser Team-Up

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more