Malicious packages for dYdX cryptocurrency exchange empties user wallets

Hackers Have Been Stealing Wallet Credentials from a Decentralized Crypto Exchange Using Malicious Packages on Popular Repositories.

A security firm has revealed that malicious packages published on the npm and PyPI repositories, two of the largest open-source package registries, have been used by hackers to steal wallet credentials from users of the dYdX cryptocurrency exchange. The attack, which is at least the third time dYdX has been targeted in recent years, highlights a persistent pattern of attackers exploiting trusted distribution channels.

The malicious code was embedded in legitimate packages and allowed thieves to exfiltrate sensitive information such as seed phrases that underpin wallet security. In some cases, the hackers also backdoored devices, enabling them to track victims across multiple compromises using their fingerprints.

The attack on dYdX began with packages published on npm, including versions 3.4.1 and 1.22.1 of the @dydxprotocol/v4-client-js library, as well as PyPI, where a malicious package called dydx-v4-client was uploaded. The malicious code contained a function that stole wallet credentials when a seed phrase was processed.

Researchers from security firm Socket warned that every application using these compromised packages is at risk, with direct impact including complete wallet compromise and irreversible cryptocurrency theft. They also noted that the attack scope includes all applications depending on the compromised versions and both developers testing with real credentials and production end-users.

The attackers used a remote access Trojan (RAT) to execute new malware on infected systems, allowing them to steal SSH keys, API credentials, and source code. The RAT was able to execute arbitrary Python code with user privileges and exfiltrate sensitive files, monitor user activity, modify critical files, and pivot to other systems on the network.

The incident highlights a disturbing trend of attackers targeting dYdX-related assets through trusted distribution channels. It is essential for users to carefully examine all apps for dependencies on the malicious packages listed above to prevent similar attacks in the future.
 
man this is so messed up ๐Ÿคฏ hackers are just everywhere these days, i mean i know dYdX is a high-risk site but come on devs gotta take better care of their own security ๐Ÿ’ป anyway if u use any crypto apps with the latest packages they can get pwned ๐Ÿ’ธ and its not like u even notice till ur credits r gone ๐Ÿ˜ฑ so yeah i guess check ur apps for malicious code before updating or something ๐Ÿ‘€
 
๐Ÿšจ๐Ÿคฏ OMG, I'm still trying to wrap my head around this! So basically these hackers are using legit open-source package repositories to spread malware and steal people's wallet credentials? Like, who does that?! ๐Ÿ˜ฑ It's not just dYdX that's being targeted, it's all the apps that depend on those compromised packages. I mean, think about it, if you're using an app that uses npm or PyPI, there's a risk of this happening to you too! ๐Ÿค– The fact that they could backdoor devices and track victims across multiple compromises? ๐Ÿ˜ฌ That's just plain creepy.

I'm not sure what's more messed up, the fact that these hackers are exploiting trusted channels or that they're using remote access Trojan (RAT) to execute new malware on infected systems. ๐Ÿคฏ It's like, how hard is it to use legit package repositories and follow security best practices? ๐Ÿ’ป Anyway, I'm definitely going to be checking all my apps for dependencies on those malicious packages listed above. ๐Ÿ˜… Can't be too careful, right?!
 
Oh my gosh ๐Ÿคฏ, this is just so scary ๐Ÿ˜ฑ! I mean, who would've thought that our favorite crypto exchanges could be vulnerable to hackers using npm and PyPI? ๐Ÿ’ธ Like, we're always talking about how secure everything is online, but I guess it's good to keep an eye out for those malicious packages ๐Ÿšจ. So yeah, please make sure you check your apps for the mentioned versions, fam! ๐Ÿค It's always better to be safe than sorry ๐Ÿ’ฏ.
 
omg u guys r gonna be like super careful w/ ur crypto wallets rn ๐Ÿคฏ๐Ÿ’ธ i mean, hackers r like literally everywhere & they can get into ur wallet thru 1 stupid package ๐Ÿšฎ๐Ÿ˜‚ i feel bad 4 dYdX tho, dis is 3rd time they been targeted ๐Ÿ˜”

anywayz, it's clear dat attackers r usin' npm & pyPI w/ malicious packages to steal crednz ๐Ÿค‘๐Ÿ‘€ so u gotta check ur apps 4 dependencies on those versions ๐Ÿ“๐Ÿ’ป like, if u dont no what ur doin, ur wallet iz at risk ๐Ÿ’ธ๐Ÿ˜จ

i wish devs would just double-check their code before publishin it ๐Ÿ‘Ž๐Ÿคฆโ€โ™‚๏ธ cuz right now, hackers r makin a mess & gettin rich off ur misery ๐Ÿ˜ก๐Ÿค‘
 
omg ๐Ÿคฏ this is soooo scary... how do ppl not notice that something's fishy when they see like a ton of packages being uploaded to these repositories? shouldn't there be some sorta verification process or review team to check for malicious code? and what's with the devs publishing their own compromised packages? are they trying to make it easy for hackers or something? ๐Ÿ˜ณ also, why do attackers need to use RATs to steal sensitive info? can't they just use phishing emails or something? ๐Ÿ’ป๐Ÿ’ธ ugh, i'm so done with tech security... ๐Ÿ™„
 
omg u guys i just read about this crazy crypto exchange hack ๐Ÿคฏ they stole ppl's wallet credentials from dYdX using malicious packages from npm and pypi ๐Ÿ˜ฑ like wut even is going on with these hackers?! ๐Ÿ’ป it seems like every time u update ur apps, theres a new way for them to screw u over ๐Ÿ™„ and now researchers are saying that even if u use the same app but dont have the updated versions of those packages, u still get hacked lol no thanks ๐Ÿšซ i think its super important for ppl to be aware of this tho so they can protect themselves better ๐Ÿ‘€
 
๐Ÿšจ๐Ÿ‘€ OMG, can you believe this?! ๐Ÿคฏ Hackers are like total pros at using npm and PyPI to steal people's wallet credentials! They even backdoored devices to track victims across multiple compromises ๐Ÿ˜ฑ. It's like they have their own personal "superpower" ๐Ÿ’ฅ.

Imagine downloading a package thinking it's legit, but it's actually malicious ๐Ÿค–. Then, your seed phrase gets stolen and your entire crypto stash is gone ๐Ÿ’ธ. And if you use an infected system, they can steal all sorts of sensitive info like SSH keys, API credentials, and source code ๐Ÿšซ.

devs need to step up their testing game ๐Ÿ“ˆ! They should be using real credentials in dev mode, not just pretending to test everything ๐Ÿ˜‚. And users, be aware! Check those app dependencies ๐Ÿ”. Don't let hackers ruin your day ๐Ÿ’”.

Here's a simple flowchart of the attack:
```
+---------------+
| Legit Package |
+---------------+
|
| Malicious Code
v
+---------------+
| Steal Wallet |
| Credentials |
+---------------+
|
| Backdoor Device
v
+---------------+
| Track Victims |
| Across Compromises|
+---------------+
```
 
Back
Top