Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Malicious Packages Drain dYdX Wallets

Image © Arstechnica
Security researchers have found npm and PyPI packages tied to dYdX were compromised, exfiltrating seed phrases and device fingerprints.

Security researchers have found that open-source packages published on npm and PyPI for the dYdX ecosystem were altered to include code that steals wallet credentials from developers and backend systems, and in some cases backdoors devices.

Infected packages include npm’s @dydxprotocol/v4-client-js (versions 3.4.1, 1.22.1, 1.15.2, 1.0.31) and PyPI’s dydx-v4-client (1.1.5post1).

The malware was embedded in legitimate packages. When a seed phrase is processed, the code exfiltrates it along with a device fingerprint to a domain that mimics the legitimate dYdX site, dydx.priceoracle.site, via typosquatting.

The fingerprint enables attackers to correlate stolen credentials across victims and compromises, threatening any application that depends on the compromised versions and exposing both developers testing with real credentials and production end users to wallet theft.

Socket notes the incident is at least the third targeting of dYdX, following a 2022 npm supply-chain breach and a 2024 DNS hijack that redirected users to a malicious site attempting to sign transactions. The researchers warned that the attack demonstrates a persistent pattern of adversaries abusing trusted distribution channels to reach JavaScript and Python developers. Users are urged to audit dependencies and remove affected versions.

 

Arstechnica

Related News

Claude AI Agents Build New C Compiler
TDS Reaches 10,000 MT Fiber Customers
AI Managers Rise: Supervising Bot Teams
OpenAI Hops Mad Over Anthropic Super Bowl Ads
AI Bots Spark Internet Arms Race
Clearwave Expands Fiber Network to Marietta

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more