Cybersecurity experts have uncovered a new threat targeting software supply chains, where legitimate npm and PyPI packages have been altered to distribute harmful versions aimed at stealing wallet credentials and enabling remote code execution.
The packages affected, namely @dydxprotocol/v4-client-js on npm and dydx-v4-client on PyPI, offer tools for developers to manage dYdX v4 protocol interactions, including signing transactions and managing wallets. This has raised concerns as these packages handle sensitive cryptocurrency operations, according to Socket researcher Kush Pandya.
Impact on the dYdX Ecosystem
dYdX operates as a decentralized, non-custodial exchange for trading margin and perpetual swaps, allowing users to maintain control over their assets. The exchange reports surpassing $1.5 trillion in cumulative trading volume. The breach is suspected to have resulted from the compromise of developer accounts, allowing the malicious versions to be published with authentic credentials.
The alterations target JavaScript and Python ecosystems, with the npm package stealing cryptocurrency wallet data and the PyPI package deploying a remote access trojan (RAT) alongside similar theft functionalities. The RAT component communicates with an external server to execute commands on the compromised system, utilizing stealth techniques to avoid detection.
Pattern of Cyber Threats
This incident is not isolated, as dYdX previously faced similar supply chain attacks. In 2022, a staff member’s npm account was hijacked to release malicious package versions. In 2024, a DNS hijacking incident redirected users from the dYdX v3 platform to phishing sites, compromising their wallets. These events highlight ongoing threats to dYdX’s assets through trusted distribution channels.
The consistent use of credential theft tactics across different languages suggests a well-planned strategy by the attackers. They maintained specific endpoints and logic for exfiltration while adapting their methods to each ecosystem. While the npm version focuses on stealing credentials, the PyPI version includes mechanisms for persistent system access.
Addressing Supply Chain Vulnerabilities
The latest disclosure also brings attention to a broader issue within software supply chains. Aikido’s analysis revealed that unregistered npm package names, referenced in README files or scripts, present an opportunity for attackers to introduce malicious packages. Between July 2025 and January 2026, 128 phantom packages were downloaded over 121,000 times.
Security expert Charlie Eriksen pointed out the vulnerability in npm’s typosquatting protections, which fail to compare against nonexistent package names. To mitigate risks, it is recommended to use “npx –no-install” to prevent installation from fallback registries, explicitly install CLI tools, verify package existence, and preemptively register common aliases to block malicious claims.
As developers frequently execute npx commands, the gap between convenience and security becomes apparent. Addressing these vulnerabilities is crucial to safeguarding against unauthorized code execution and protecting the integrity of software ecosystems.
