dYdX Packages Turn Malicious: How One Update Steals Wallets [Prime Cyber Insights]
dYdX Packages Turn Malicious: How One Update Steals Wallets [Prime Cyber Insights]
Prime Cyber Insights

dYdX Packages Turn Malicious: How One Update Steals Wallets [Prime Cyber Insights]

Compromised dYdX client packages on npm and PyPI shipped malware that steals crypto wallet seed phrases and, in Python, can run remote commands on infected machines. The core takeaway: if your apps pulled the affected versions, treat it like credential th

Episode E857
February 6, 2026
05:00
Hosts: Neural Newscast
News
dYdX
npm
PyPI
supply chain attack
wallet stealer
RAT
remote access trojan
dependency security
developer account compromise
CISA
Binding Operational Directive 26-02
end-of-support edge devices
firewalls
VPN gateways
npx confusion
phantom packages
software supply chain security
PrimeCyberInsights

Now Playing: dYdX Packages Turn Malicious: How One Update Steals Wallets [Prime Cyber Insights]

Download size: 9.2 MB

Share Episode

SubscribeListen on Transistor

Episode Summary

Compromised dYdX client packages on npm and PyPI shipped malware that steals crypto wallet seed phrases and, in Python, can run remote commands on infected machines. The core takeaway: if your apps pulled the affected versions, treat it like credential theft plus potential remote access, and rotate keys and wallets from a clean system. Researchers say the poisoned releases were published using legitimate credentials, pointing to a likely maintainer account compromise rather than a registry flaw. The JavaScript package (@dydxprotocol/v4-client-js) focused on wallet credential and device data theft, while the Python package (dydx-v4-client) added a RAT that executes on import and beacons to an external command server. In parallel, CISA issued a binding directive ordering U.S. federal agencies to inventory and replace end-of-support edge devices, warning that perimeter gear with no patches has become a repeatable initial access path. Together, the stories underline a simple pattern: attackers win by owning trusted distribution points—package registries and perimeter infrastructure.

Subscribe so you don't miss the next episode

Show Notes

Compromised dYdX client libraries on npm and PyPI were updated with malware designed to steal wallet seed phrases—and in the Python variant, a RAT capable of executing remote commands as soon as the package is imported. If you installed the impacted versions, response should be treated as both credential compromise and potential host compromise: isolate systems, move funds using a clean machine, and rotate API keys and secrets. We also break down CISA’s new binding directive ordering U.S. federal agencies to identify and replace end-of-support edge devices—firewalls, routers, VPN gateways, and other perimeter systems that attackers increasingly use as reliable entry points.

Topics Covered

🔒 Open-source supply chain compromise in npm and PyPI packages
🚨 Wallet-stealer + RAT behavior, indicators, and why “import-time” execution matters
🛡️ Practical incident response steps: isolation, key rotation, wallet migration, and dependency pinning
🌐 CISA’s end-of-support edge device directive and the risk of unpatched perimeter gear
📊 “Phantom packages” and npx confusion: how unclaimed names become code execution

Disclaimer: This episode is for informational purposes only and does not constitute legal, financial, or security advice.

Neural Newscast is AI-assisted, human reviewed. View our AI Transparency Policy at NeuralNewscast.com.

  • (00:00) - Introduction
  • (00:30) - dYdX npm & PyPI Malware: Wallet Stealer and RAT
  • (00:52) - CISA Orders Removal of End-of-Support Edge Devices
  • (01:11) - Conclusion

Transcript

Full Transcript Available
[00:00] Aaron Cole: I'm Aaron Cole. This is Prime Cyber Insights, straight to what matters and what to do next. [00:05] Aaron Cole: Today, we've got two big ones. A DYGX supply chain compromise on NPM and PIPI that can steal wallet [00:12] Aaron Cole: secrets and a federal push to rip out end-of-support edge gear before it basically becomes an [00:18] Aaron Cole: attacker's front door. [00:19] Lauren Mitchell: I'm Lauren Mitchell. Joining us today is Nina Park, a science education correspondent who breaks down scientific concepts for broad audiences. [00:29] Lauren Mitchell: Nina, glad you're here. [00:30] Nina Park: Let's start with the DYDX client libraries. Multiple versions of at DYDX protocol slash v4 client JS on NPM and DYDX v4 client on PyPI were published with malicious code. [00:45] Nina Park: And these packages sit right in the path of transaction signing, order placement, wallet [00:51] Nina Park: management. [00:52] Nina Park: So the blast radius is exactly where you don't want it. [00:56] Lauren Mitchell: The reporting suggests the poisoned releases were pushed using legitimate publishing credentials, which is a big clue. [01:03] Lauren Mitchell: This looks like a maintainer account compromise, not a registry vulnerability. [01:08] Lauren Mitchell: And the payloads differ by ecosystem. [01:11] Lauren Mitchell: JavaScript focuses on siphoning seed phrases and device data, while Python adds a remote-access Trojan on top of the wallet stealer. [01:19] Nina Park: That Python detail is the red flag. [01:22] Nina Park: The RAT can execute as soon as the package is imported. [01:26] Nina Park: Then it calls out to an external server to pull commands for execution. [01:30] Nina Park: On Windows, it even uses a no-window execution flag, [01:34] Nina Park: so you won't get obvious user-facing signs. [01:37] Nina Park: If your environment pulled the affected builds, [01:39] Nina Park: assume credential theft plus possible remote code execution. [01:43] Lauren Mitchell: Nina, for listeners who don't live in dependency land, [01:47] Lauren Mitchell: Why do supply chain attacks like this spread so fast, even when the victim isn't DYDX the exchange, but developers using a library? [01:56] Nina Park: And while you answer, here's the immediate action list based on DYDX guidance. [02:02] Nina Park: Isolate affected machines, move funds to a new wallet from a clean system, and rotate all API keys and credentials. [02:09] Nina Park: Also, don't confuse these registry packages with code hosted in the DYDX protocol GitHub. [02:16] Nina Park: DYDX says the GitHub-hosted versions did not contain the malware. [02:20] Lauren Mitchell: Now the policy side, CISA issued a binding operational directive ordering U.S. federal civilian agencies to inventory and replace end-of-support edge devices, [02:31] Lauren Mitchell: firewalls, routers, VPN gateways, other perimeter systems that vendors no longer patch. [02:37] Lauren Mitchell: Agencies have to catalog quickly, decommission end-of-support gear on a defined timeline, [02:43] Lauren Mitchell: and stand up a life cycle process so abandonware doesn't quietly creep back in. [02:49] Nina Park: This matters beyond government. [02:51] Nina Park: Edge devices sit at the perimeter with privileged access, [02:55] Nina Park: and once they're unsupported, every newly discovered flaw is effectively permanent. [03:00] Nina Park: Attackers love that because it's low-noise, high-leverage access. [03:03] Nina Park: CESA's message is blunt. [03:06] Nina Park: Technical debt at the perimeter becomes an intrusion path you can predict." [03:10] Lauren Mitchell: There's also a parallel supply chain caution from Ikeido, phantom packages referenced [03:16] Lauren Mitchell: in read-me's or scripts but never actually published. [03:20] Lauren Mitchell: If a tool name doesn't exist, the first person to claim it can turn convenience into code [03:25] Lauren Mitchell: execution, especially in the NPX workflow. [03:28] Lauren Mitchell: Their mitigation is practical. [03:30] Lauren Mitchell: Use NPX-dash-no-install, install CLIs explicitly, verify packages exist, and pre-register obvious [03:39] Lauren Mitchell: aliases. [03:40] Nina Park: Let's stitch the themes together. [03:43] Nina Park: Trusted distribution points. [03:44] Nina Park: Package registries are trust at developer speed. [03:48] Nina Park: Edge devices are trust at network speed. [03:50] Nina Park: Defenses look similar. [03:52] Nina Park: Strong publisher controls, scoped tokens, MFA, release monitoring, dependency pinning on the software [03:59] Nina Park: side, and lifecycle management, inventory, and replacement discipline on the infrastructure [04:06] Nina Park: side. [04:06] Lauren Mitchell: And your quick self-check. [04:08] Lauren Mitchell: If you build or deploy crypto-adjacent apps, [04:11] Lauren Mitchell: audit for those specific compromised DYDX versions, [04:14] Lauren Mitchell: hunt for unexpected outbound traffic, [04:17] Lauren Mitchell: and treat secrets as burned. [04:19] Lauren Mitchell: If you run networks, [04:20] Lauren Mitchell: find what's end of support at the edge [04:23] Lauren Mitchell: and budget the replacement, [04:24] Lauren Mitchell: because attackers already have. [04:26] Nina Park: I'm Aaron Cole. [04:28] Nina Park: That's Prime Cyber Insights. [04:29] Nina Park: Move fast, verify trust, [04:31] Nina Park: and don't leave attackers a quiet path in [04:34] Nina Park: through your dependencies or your perimeter. [04:36] Lauren Mitchell: I'm Lauren Mitchell. Thanks for listening. Subscribe for more on supply chain risk, incident response [04:43] Lauren Mitchell: priorities, and the controls that actually reduce blast radius. For the full notes and links, [04:49] Lauren Mitchell: head to pci.neuralnewscast.com. Neural Newscast is AI-assisted, human-reviewed. [04:55] Lauren Mitchell: View our AI transparency policy at neuralnewscast.com.

✓ Full transcript loaded from separate file: transcript.txt

Loading featured stories...