feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Malware in dYdX Packages Steals Crypto Keys

Malware in dYdX Packages Steals Crypto Keys

7 Feb

•

Summary

  • Malicious code in npm and PyPI packages stole developer wallet credentials.
  • Attackers used typosquatting to mimic legitimate dYdX services.
  • This is at least the third attack targeting dYdX assets.
Malware in dYdX Packages Steals Crypto Keys

Open-source packages associated with the decentralized derivatives exchange dYdX were compromised with malicious code designed to steal wallet credentials and backdoor systems. Researchers discovered infected packages on both the npm and PyPI repositories, posing a significant risk to applications that utilize these libraries.

The malware embedded within the npm package (@dydxprotocol/v4-client-js) exfiltrated seed phrases and device fingerprints, directing them to a typosquatted domain, dydx[.]priceoracle[.]site. The PyPI package (dydx-v4-client) contained similar credential-stealing functions, with the addition of a remote access Trojan (RAT) capable of executing arbitrary Python code on infected systems.

This incident represents at least the third attack targeting dYdX, following a malicious code upload in September 2022 and a DNS hijacking event in early 2024. The simultaneous compromise of packages across npm and PyPI underscores a pattern of adversaries targeting dYdX through trusted channels, expanding the attack surface to both JavaScript and Python developers.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
Malicious code was found in dYdX packages on npm, including @dydxprotocol/v4-client-js versions 3.4.1, 1.22.1, 1.15.2, and 1.0.31, and on PyPI, specifically dydx-v4-client version 1.1.5post1.
The malware stole wallet credentials, exfiltrated seed phrases and device fingerprints, and in some cases, installed a remote access Trojan (RAT) that allowed for arbitrary code execution and further data theft.
No, this is at least the third attack targeting dYdX assets, following a malicious code upload in September 2022 and a DNS hijacking incident in early 2024.

Read more news on

Technologyside-arrow
trending

Islamabad suicide blast kills 31

trending

Ronaldo trains with Al Nassr

trending

India A vs Namibia live

trending

Vaibhav Suryavanshi scores 175

trending

VTU adopts Artificial Super Intelligence

trending

Riyan Parag scores fifty

trending

T20 World Cup opening ceremony

trending

Tiigers Kolkata reach ISPL final

trending

Al Ettifaq favored vs Damac

You may also like

Europe's Broadcasters Renew Major Series Pact

28 Jan • 56 reads

article image

Titan Shares Soar 4.5% on Strong Q3 Update

7 Jan • 164 reads

article image

Hisense Unveils Dazzling CES 2026 Projectors

23 Dec, 2025 • 225 reads

article image

3M Hid Toxic Foam Risks For Decades, Workers Exposed

16 Dec, 2025 • 285 reads

article image

EQT Deal Shifts 1X Neo to Industrial Use

12 Dec, 2025 • 181 reads

article image