Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
dYdX Packages Breached: Wallet Theft and Malware Risks

dYdX Packages Breached: Wallet Theft and Malware Risks

Posted on February 6, 2026 By CWS

Cybersecurity experts have uncovered a new threat targeting software supply chains, where legitimate npm and PyPI packages have been altered to distribute harmful versions aimed at stealing wallet credentials and enabling remote code execution.

The packages affected, namely @dydxprotocol/v4-client-js on npm and dydx-v4-client on PyPI, offer tools for developers to manage dYdX v4 protocol interactions, including signing transactions and managing wallets. This has raised concerns as these packages handle sensitive cryptocurrency operations, according to Socket researcher Kush Pandya.

Impact on the dYdX Ecosystem

dYdX operates as a decentralized, non-custodial exchange for trading margin and perpetual swaps, allowing users to maintain control over their assets. The exchange reports surpassing $1.5 trillion in cumulative trading volume. The breach is suspected to have resulted from the compromise of developer accounts, allowing the malicious versions to be published with authentic credentials.

The alterations target JavaScript and Python ecosystems, with the npm package stealing cryptocurrency wallet data and the PyPI package deploying a remote access trojan (RAT) alongside similar theft functionalities. The RAT component communicates with an external server to execute commands on the compromised system, utilizing stealth techniques to avoid detection.

Pattern of Cyber Threats

This incident is not isolated, as dYdX previously faced similar supply chain attacks. In 2022, a staff member’s npm account was hijacked to release malicious package versions. In 2024, a DNS hijacking incident redirected users from the dYdX v3 platform to phishing sites, compromising their wallets. These events highlight ongoing threats to dYdX’s assets through trusted distribution channels.

The consistent use of credential theft tactics across different languages suggests a well-planned strategy by the attackers. They maintained specific endpoints and logic for exfiltration while adapting their methods to each ecosystem. While the npm version focuses on stealing credentials, the PyPI version includes mechanisms for persistent system access.

Addressing Supply Chain Vulnerabilities

The latest disclosure also brings attention to a broader issue within software supply chains. Aikido’s analysis revealed that unregistered npm package names, referenced in README files or scripts, present an opportunity for attackers to introduce malicious packages. Between July 2025 and January 2026, 128 phantom packages were downloaded over 121,000 times.

Security expert Charlie Eriksen pointed out the vulnerability in npm’s typosquatting protections, which fail to compare against nonexistent package names. To mitigate risks, it is recommended to use “npx –no-install” to prevent installation from fallback registries, explicitly install CLI tools, verify package existence, and preemptively register common aliases to block malicious claims.

As developers frequently execute npx commands, the gap between convenience and security becomes apparent. Addressing these vulnerabilities is crucial to safeguarding against unauthorized code execution and protecting the integrity of software ecosystems.

The Hacker News Tags:Cryptocurrency, Cybersecurity, developer account compromise, dYdX, Malware, NPM, open source security, package management, Phishing, PyPI, remote access trojan, software vulnerabilities, supply chain attack, typosquatting, wallet theft

Post navigation

Previous Post: Spam Campaign Utilizes Fake PDFs for Remote Access
Next Post: Airrived Secures $6.1 Million for AI-Powered Operations

Related Posts

APT36 and SideCopy Target Indian Defense with RATs APT36 and SideCopy Target Indian Defense with RATs The Hacker News
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization The Hacker News
State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments The Hacker News
Gainsight Expands Impacted Customer List Following Salesforce Security Alert Gainsight Expands Impacted Customer List Following Salesforce Security Alert The Hacker News
Vulnerability in Claude Extension Exposes Users to XSS Attacks Vulnerability in Claude Extension Exposes Users to XSS Attacks The Hacker News
A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark