Malicious Packages: How dYdX Users Lost Their Crypto Wallets (2026)

Imagine waking up to find your cryptocurrency wallet completely drained, with no way to recover your funds. This is the harsh reality for some users of the dYdX exchange, thanks to a sophisticated attack that exploited open-source packages. But here's where it gets even more alarming: the malicious code didn't just target individual wallets—it also backdoored devices, potentially giving attackers ongoing access to sensitive information.

Researchers from the security firm Socket uncovered a disturbing trend: open-source packages published on npm and PyPI repositories had been secretly laced with code designed to steal wallet credentials from dYdX developers and backend systems. These packages, which are widely used by developers and end-users alike, became silent accomplices in a large-scale cryptocurrency theft operation.

And this is the part most people miss: the attack wasn't limited to a single version or package. Multiple versions of the @dydxprotocol/v4-client-js package on npm and the dydx-v4-client package on PyPI were compromised, putting countless applications at risk. Here’s the full list of infected versions:

Socket warned, “Every application using the compromised npm versions is at risk… Direct impact includes complete wallet compromise and irreversible cryptocurrency theft.” The scope of the attack is staggering, affecting not only developers testing with real credentials but also production end-users who rely on these packages for trading bots, automated strategies, and backend services.

dYdX, a decentralized derivatives exchange known for its “perpetual trading” markets, has processed over $1.5 trillion in trading volume since its inception. With an average daily trading volume of $200 million to $540 million, it’s a prime target for attackers. The exchange provides code libraries that handle sensitive data like mnemonics and private keys, making it a goldmine for malicious actors.

Here’s how the attack worked: The npm malware embedded a malicious function within the legitimate package. When a seed phrase—the backbone of wallet security—was processed, the function exfiltrated it, along with a fingerprint of the device running the app. This fingerprint allowed the attacker to correlate stolen credentials and track victims across multiple compromises. The stolen data was sent to a domain, dydx[.]priceoracle[.]site, which cleverly mimicked the legitimate dYdX service at dydx[.]xyz through typosquatting.

This incident raises a critical question: How safe are open-source packages, and what more can be done to protect users from such attacks? While open-source collaboration is a cornerstone of modern software development, it also introduces vulnerabilities that can be exploited at scale. Should developers and organizations rely more heavily on security audits and package verification tools? Or is it time for a fundamental shift in how we approach open-source dependency management?

Let’s spark a conversation: Do you think the responsibility for securing open-source packages lies with developers, repository maintainers, or end-users? Share your thoughts in the comments—this is a debate we can’t afford to ignore.

Malicious Packages: How dYdX Users Lost Their Crypto Wallets (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Ouida Strosin DO

Last Updated:

Views: 6277

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Ouida Strosin DO

Birthday: 1995-04-27

Address: Suite 927 930 Kilback Radial, Candidaville, TN 87795

Phone: +8561498978366

Job: Legacy Manufacturing Specialist

Hobby: Singing, Mountain biking, Water sports, Water sports, Taxidermy, Polo, Pet

Introduction: My name is Ouida Strosin DO, I am a precious, combative, spotless, modern, spotless, beautiful, precious person who loves writing and wants to share my knowledge and understanding with you.