Cyber Thieves Steal Wallets on Popular Cryptocurrency Exchange, Using Malicious Packages Published on Public Repositories.
A sophisticated cyber attack has hit the cryptocurrency exchange dYdX, with hackers using malicious packages published on public repositories to steal wallet credentials and backdoor devices. Researchers from security firm Socket have warned that every application using compromised npm versions is at risk of complete wallet compromise and irreversible cryptocurrency theft.
The attack was carried out by stealing seed phrases that underpin wallet security, along with device fingerprints, which allowed the threat actors to track victims across multiple compromises. The malicious code embedded a function in legitimate packages, allowing the thieves to exfiltrate sensitive information, including private keys and API credentials.
The packages were published on npm and PyPI repositories using official dYdX accounts, suggesting that they were compromised and used by the attackers. This is not the first time dYdX has been targeted in a cyber attack; previous incidents include malicious code uploaded to the npm repository in September 2022 and the commandeering of the dYdX v3 website through DNS hijacking in 2024.
The latest attack highlights a persistent pattern of adversaries targeting dYdX-related assets through trusted distribution channels. Researchers have warned that anyone using the platform should carefully examine all apps for dependencies on the malicious packages listed above, as they could be vulnerable to similar attacks.
The attackers used a remote access Trojan (RAT) that allowed them to execute new malware on infected systems, receive Python code from a C2 server, and use it in an isolated subprocess with no visible output. They also stole SSH keys, API credentials, and source code, and installed persistent backdoors.
This incident serves as a reminder of the importance of keeping software up-to-date and being cautious when using third-party libraries and dependencies to avoid falling prey to similar attacks.
A sophisticated cyber attack has hit the cryptocurrency exchange dYdX, with hackers using malicious packages published on public repositories to steal wallet credentials and backdoor devices. Researchers from security firm Socket have warned that every application using compromised npm versions is at risk of complete wallet compromise and irreversible cryptocurrency theft.
The attack was carried out by stealing seed phrases that underpin wallet security, along with device fingerprints, which allowed the threat actors to track victims across multiple compromises. The malicious code embedded a function in legitimate packages, allowing the thieves to exfiltrate sensitive information, including private keys and API credentials.
The packages were published on npm and PyPI repositories using official dYdX accounts, suggesting that they were compromised and used by the attackers. This is not the first time dYdX has been targeted in a cyber attack; previous incidents include malicious code uploaded to the npm repository in September 2022 and the commandeering of the dYdX v3 website through DNS hijacking in 2024.
The latest attack highlights a persistent pattern of adversaries targeting dYdX-related assets through trusted distribution channels. Researchers have warned that anyone using the platform should carefully examine all apps for dependencies on the malicious packages listed above, as they could be vulnerable to similar attacks.
The attackers used a remote access Trojan (RAT) that allowed them to execute new malware on infected systems, receive Python code from a C2 server, and use it in an isolated subprocess with no visible output. They also stole SSH keys, API credentials, and source code, and installed persistent backdoors.
This incident serves as a reminder of the importance of keeping software up-to-date and being cautious when using third-party libraries and dependencies to avoid falling prey to similar attacks.