Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
dYdX Packages Breached: Wallet Theft and Malware Risks

dYdX Packages Breached: Wallet Theft and Malware Risks

Posted on February 6, 2026 By CWS

Cybersecurity experts have uncovered a new threat targeting software supply chains, where legitimate npm and PyPI packages have been altered to distribute harmful versions aimed at stealing wallet credentials and enabling remote code execution.

The packages affected, namely @dydxprotocol/v4-client-js on npm and dydx-v4-client on PyPI, offer tools for developers to manage dYdX v4 protocol interactions, including signing transactions and managing wallets. This has raised concerns as these packages handle sensitive cryptocurrency operations, according to Socket researcher Kush Pandya.

Impact on the dYdX Ecosystem

dYdX operates as a decentralized, non-custodial exchange for trading margin and perpetual swaps, allowing users to maintain control over their assets. The exchange reports surpassing $1.5 trillion in cumulative trading volume. The breach is suspected to have resulted from the compromise of developer accounts, allowing the malicious versions to be published with authentic credentials.

The alterations target JavaScript and Python ecosystems, with the npm package stealing cryptocurrency wallet data and the PyPI package deploying a remote access trojan (RAT) alongside similar theft functionalities. The RAT component communicates with an external server to execute commands on the compromised system, utilizing stealth techniques to avoid detection.

Pattern of Cyber Threats

This incident is not isolated, as dYdX previously faced similar supply chain attacks. In 2022, a staff member’s npm account was hijacked to release malicious package versions. In 2024, a DNS hijacking incident redirected users from the dYdX v3 platform to phishing sites, compromising their wallets. These events highlight ongoing threats to dYdX’s assets through trusted distribution channels.

The consistent use of credential theft tactics across different languages suggests a well-planned strategy by the attackers. They maintained specific endpoints and logic for exfiltration while adapting their methods to each ecosystem. While the npm version focuses on stealing credentials, the PyPI version includes mechanisms for persistent system access.

Addressing Supply Chain Vulnerabilities

The latest disclosure also brings attention to a broader issue within software supply chains. Aikido’s analysis revealed that unregistered npm package names, referenced in README files or scripts, present an opportunity for attackers to introduce malicious packages. Between July 2025 and January 2026, 128 phantom packages were downloaded over 121,000 times.

Security expert Charlie Eriksen pointed out the vulnerability in npm’s typosquatting protections, which fail to compare against nonexistent package names. To mitigate risks, it is recommended to use “npx –no-install” to prevent installation from fallback registries, explicitly install CLI tools, verify package existence, and preemptively register common aliases to block malicious claims.

As developers frequently execute npx commands, the gap between convenience and security becomes apparent. Addressing these vulnerabilities is crucial to safeguarding against unauthorized code execution and protecting the integrity of software ecosystems.

The Hacker News Tags:Cryptocurrency, Cybersecurity, developer account compromise, dYdX, Malware, NPM, open source security, package management, Phishing, PyPI, remote access trojan, software vulnerabilities, supply chain attack, typosquatting, wallet theft

Post navigation

Previous Post: Spam Campaign Utilizes Fake PDFs for Remote Access
Next Post: Airrived Secures $6.1 Million for AI-Powered Operations

Related Posts

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure The Hacker News
SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release The Hacker News
ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots The Hacker News
Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown The Hacker News
U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure The Hacker News
Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News