Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
dYdX Packages Breached: Wallet Theft and Malware Risks

dYdX Packages Breached: Wallet Theft and Malware Risks

Posted on February 6, 2026 By CWS

Cybersecurity experts have uncovered a new threat targeting software supply chains, where legitimate npm and PyPI packages have been altered to distribute harmful versions aimed at stealing wallet credentials and enabling remote code execution.

The packages affected, namely @dydxprotocol/v4-client-js on npm and dydx-v4-client on PyPI, offer tools for developers to manage dYdX v4 protocol interactions, including signing transactions and managing wallets. This has raised concerns as these packages handle sensitive cryptocurrency operations, according to Socket researcher Kush Pandya.

Impact on the dYdX Ecosystem

dYdX operates as a decentralized, non-custodial exchange for trading margin and perpetual swaps, allowing users to maintain control over their assets. The exchange reports surpassing $1.5 trillion in cumulative trading volume. The breach is suspected to have resulted from the compromise of developer accounts, allowing the malicious versions to be published with authentic credentials.

The alterations target JavaScript and Python ecosystems, with the npm package stealing cryptocurrency wallet data and the PyPI package deploying a remote access trojan (RAT) alongside similar theft functionalities. The RAT component communicates with an external server to execute commands on the compromised system, utilizing stealth techniques to avoid detection.

Pattern of Cyber Threats

This incident is not isolated, as dYdX previously faced similar supply chain attacks. In 2022, a staff member’s npm account was hijacked to release malicious package versions. In 2024, a DNS hijacking incident redirected users from the dYdX v3 platform to phishing sites, compromising their wallets. These events highlight ongoing threats to dYdX’s assets through trusted distribution channels.

The consistent use of credential theft tactics across different languages suggests a well-planned strategy by the attackers. They maintained specific endpoints and logic for exfiltration while adapting their methods to each ecosystem. While the npm version focuses on stealing credentials, the PyPI version includes mechanisms for persistent system access.

Addressing Supply Chain Vulnerabilities

The latest disclosure also brings attention to a broader issue within software supply chains. Aikido’s analysis revealed that unregistered npm package names, referenced in README files or scripts, present an opportunity for attackers to introduce malicious packages. Between July 2025 and January 2026, 128 phantom packages were downloaded over 121,000 times.

Security expert Charlie Eriksen pointed out the vulnerability in npm’s typosquatting protections, which fail to compare against nonexistent package names. To mitigate risks, it is recommended to use “npx –no-install” to prevent installation from fallback registries, explicitly install CLI tools, verify package existence, and preemptively register common aliases to block malicious claims.

As developers frequently execute npx commands, the gap between convenience and security becomes apparent. Addressing these vulnerabilities is crucial to safeguarding against unauthorized code execution and protecting the integrity of software ecosystems.

The Hacker News Tags:Cryptocurrency, Cybersecurity, developer account compromise, dYdX, Malware, NPM, open source security, package management, Phishing, PyPI, remote access trojan, software vulnerabilities, supply chain attack, typosquatting, wallet theft

Post navigation

Previous Post: Spam Campaign Utilizes Fake PDFs for Remote Access
Next Post: Airrived Secures $6.1 Million for AI-Powered Operations

Related Posts

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery The Hacker News
VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption The Hacker News
Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra The Hacker News
Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet The Hacker News
U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues The Hacker News
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Asian Cyber Group Infiltrates 70 Global Organizations
  • APT-Q-27 Evades Detection in Corporate Cyberattack
  • Flickr Alerts Users to Data Exposure via Email Service
  • F5 Addresses Critical Security Flaws in BIG-IP and NGINX
  • SmarterMail Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Asian Cyber Group Infiltrates 70 Global Organizations
  • APT-Q-27 Evades Detection in Corporate Cyberattack
  • Flickr Alerts Users to Data Exposure via Email Service
  • F5 Addresses Critical Security Flaws in BIG-IP and NGINX
  • SmarterMail Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark