radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

sourceThe Hacker News
calendar_todayFebruary 6, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Supply Chain Attack Targets dYdX npm and PyPI Packages with Malware

Summary

Cybersecurity researchers have identified a supply chain attack involving the compromise of legitimate npm and PyPI packages to distribute malware aimed at stealing wallet credentials and enabling remote code execution.

Key Points

  • The attack targets npm and PyPI repositories, specifically the packages @dydxprotocol/v4-client-js.
  • Compromised versions include 3.4.1, 1.22.1, 1.15.2, and 1.0.31.
  • The malicious packages are designed to facilitate wallet credential theft and remote code execution (RCE).
  • This incident highlights the vulnerabilities in software supply chains, particularly in open-source ecosystems.

Analysis

This attack underscores the critical vulnerabilities present in software supply chains, especially within open-source ecosystems like npm and PyPI. By compromising legitimate packages, attackers can distribute malware widely and stealthily, potentially impacting a large number of users who rely on these packages for development purposes. The inclusion of remote code execution capabilities makes this a severe threat, as it allows attackers to execute arbitrary code on affected systems.

Conclusion

IT professionals should immediately audit their use of the affected packages and ensure they are not using compromised versions. Regularly monitoring for updates and maintaining a robust security posture is essential to mitigate such supply chain threats.