Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
TM RedHotCyber 970x120 042543
Hackers Publish Malicious dYdX Packages on npm and PyPI: Wallets at Risk

Hackers Publish Malicious dYdX Packages on npm and PyPI: Wallets at Risk

6 February 2026 10:15

A recent supply chain attack has drawn attention in the developer and crypto communities. On February 5, 2026, Socket’s security team detected malicious dYdX packages uploaded to npm and PyPI.

These releases disguised themselves as legitimate libraries but included hidden code capable of stealing wallet credentials and executing commands remotely, putting unsuspecting users at serious risk.

How the compromise occurred

The investigation revealed that attackers had taken over the publication credentials of a dYdX maintainer, allowing them to push infected versions without triggering standard repository alerts. This account takeover was the confirmed vector of the incident.

Malicious code was embedded in production files, making it nearly invisible to standard audits. Developers installing these packages would see normal library behavior, while sensitive data like seed phrases could be exfiltrated silently.

Behavior of the malicious packages

The npm package @dydxprotocol/v4-client-js included routines that captured wallet mnemonics and device fingerprints. These details were transmitted to the command-and-control domain dydx.priceoracle[.]site/js.

On PyPI, the dydx-v4-client package (version 1.1.5post1) also stole credentials and implemented Remote Access Trojan (RAT) features. On Windows, it used the CREATE_NO_WINDOW flag to hide console execution, making its actions stealthy while sending data to dydx.priceoracle[.]site/py.

Affected versions and impact

The compromised npm releases were 3.4.2, 1.22.2, 1.15.3, and 1.0.32. For PyPI, only dydx-v4-client 1.1.5post1 was affected. These packages are widely used in crypto trading bots, wallet management tools, and automation systems, meaning the attack could have far-reaching consequences in the DeFi ecosystem.

The supply chain compromise demonstrates how a single compromised maintainer account can endanger many users. Continuous monitoring and dependency verification are essential safeguards.

Mitigation and lessons

Developers should audit their dependencies, verify package integrity, and promptly update to safe versions. Awareness of supply chain risks is critical to prevent similar attacks in the future.

The detailed analysis by Socket reinforces that vigilance in the open-source ecosystem is a first line of defense against increasingly sophisticated attacks.

Even a minor package update can carry hidden threats. Users and developers alike must adopt a security-first mindset to protect sensitive crypto assets.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.