-
Notifications
You must be signed in to change notification settings - Fork 156
@dydxprotocol packages download and execute a third party malicious code [malicious takeover] #521
Comments
Ok, the malicious packages versions were taken down after my report to NPM. Now let me write a blog post on this with a post-mortem. |
The platform we're building triggered on this about 4 hours ago. Was going to reach out to alert you, but glad to see you guys were on top of it. If you need any files/timestamps for the post-mortem, please let me know. Would be happy to help out! |
@louislang I think I have all the data. |
👍 great work on the quick catch! |
GH issued the advisories per my request: |
Thanks all, I have reached out to npm to offer advisories and take down the affected packages. At the time of writing all have been taken down except |
@BrendanChou any chance on getting info on how effective the attackers were on your side? |
Hey, I'm a security researcher from https://mend.io
This malicious code was found by us at https://Mend.io using our Supply Chain Defender technology
Looking at the diff here: https://my.diffend.io/npm/@dydxprotocol/solo/0.41.0/0.41.1
A preinstall was added:
but this script contains a code that looks malicious:
it seems to be stealing credentials and other secrets.
This applies to other packages of the ecosystem as well.
The text was updated successfully, but these errors were encountered: