Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
Overview
Researchers have identified a supply chain attack affecting legitimate npm and PyPI packages, specifically targeting versions of @dydxprotocol/v4-client-js. The compromised versions include 3.4.1, 1.22.1, 1.15.2, and 1.0.31. Attackers have modified these packages to distribute malware designed to steal cryptocurrency wallet credentials and enable remote access through RAT (Remote Access Trojan) software. This incident poses a significant risk to developers and users relying on these packages, as it can lead to unauthorized access to sensitive financial information. Companies and individual developers should review their dependencies and ensure they are using safe versions to mitigate potential risks.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: @dydxprotocol/v4-client-js (npm) versions 3.4.1, 1.22.1, 1.15.2, 1.0.31
- Action Required: Developers should update to safe versions of @dydxprotocol/v4-client-js and review their package dependencies for any signs of compromise.
- Timeline: Newly disclosed
Original Article Summary
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to facilitate wallet credential theft and remote code execution. The compromised versions of the two packages are listed below - @dydxprotocol/v4-client-js (npm) - 3.4.1, 1.22.1, 1.15.2, 1.0.31&
Impact
@dydxprotocol/v4-client-js (npm) versions 3.4.1, 1.22.1, 1.15.2, 1.0.31
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Developers should update to safe versions of @dydxprotocol/v4-client-js and review their package dependencies for any signs of compromise.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Malware, Trojan.