[00:00] Aaron Cole: I'm Aaron Cole. This is Prime Cyber Insights, straight to what matters and what to do next. [00:05] Aaron Cole: Today, we've got two big ones. A DYGX supply chain compromise on NPM and PIPI that can steal wallet [00:12] Aaron Cole: secrets and a federal push to rip out end-of-support edge gear before it basically becomes an [00:18] Aaron Cole: attacker's front door. [00:19] Lauren Mitchell: I'm Lauren Mitchell. Joining us today is Nina Park, a science education correspondent who breaks down scientific concepts for broad audiences. [00:29] Lauren Mitchell: Nina, glad you're here. [00:30] Nina Park: Let's start with the DYDX client libraries. Multiple versions of at DYDX protocol slash v4 client JS on NPM and DYDX v4 client on PyPI were published with malicious code. [00:45] Nina Park: And these packages sit right in the path of transaction signing, order placement, wallet [00:51] Nina Park: management. [00:52] Nina Park: So the blast radius is exactly where you don't want it. [00:56] Lauren Mitchell: The reporting suggests the poisoned releases were pushed using legitimate publishing credentials, which is a big clue. [01:03] Lauren Mitchell: This looks like a maintainer account compromise, not a registry vulnerability. [01:08] Lauren Mitchell: And the payloads differ by ecosystem. [01:11] Lauren Mitchell: JavaScript focuses on siphoning seed phrases and device data, while Python adds a remote-access Trojan on top of the wallet stealer. [01:19] Nina Park: That Python detail is the red flag. [01:22] Nina Park: The RAT can execute as soon as the package is imported. [01:26] Nina Park: Then it calls out to an external server to pull commands for execution. [01:30] Nina Park: On Windows, it even uses a no-window execution flag, [01:34] Nina Park: so you won't get obvious user-facing signs. [01:37] Nina Park: If your environment pulled the affected builds, [01:39] Nina Park: assume credential theft plus possible remote code execution. [01:43] Lauren Mitchell: Nina, for listeners who don't live in dependency land, [01:47] Lauren Mitchell: Why do supply chain attacks like this spread so fast, even when the victim isn't DYDX the exchange, but developers using a library? [01:56] Nina Park: And while you answer, here's the immediate action list based on DYDX guidance. [02:02] Nina Park: Isolate affected machines, move funds to a new wallet from a clean system, and rotate all API keys and credentials. [02:09] Nina Park: Also, don't confuse these registry packages with code hosted in the DYDX protocol GitHub. [02:16] Nina Park: DYDX says the GitHub-hosted versions did not contain the malware. [02:20] Lauren Mitchell: Now the policy side, CISA issued a binding operational directive ordering U.S. federal civilian agencies to inventory and replace end-of-support edge devices, [02:31] Lauren Mitchell: firewalls, routers, VPN gateways, other perimeter systems that vendors no longer patch. [02:37] Lauren Mitchell: Agencies have to catalog quickly, decommission end-of-support gear on a defined timeline, [02:43] Lauren Mitchell: and stand up a life cycle process so abandonware doesn't quietly creep back in. [02:49] Nina Park: This matters beyond government. [02:51] Nina Park: Edge devices sit at the perimeter with privileged access, [02:55] Nina Park: and once they're unsupported, every newly discovered flaw is effectively permanent. [03:00] Nina Park: Attackers love that because it's low-noise, high-leverage access. [03:03] Nina Park: CESA's message is blunt. [03:06] Nina Park: Technical debt at the perimeter becomes an intrusion path you can predict." [03:10] Lauren Mitchell: There's also a parallel supply chain caution from Ikeido, phantom packages referenced [03:16] Lauren Mitchell: in read-me's or scripts but never actually published. [03:20] Lauren Mitchell: If a tool name doesn't exist, the first person to claim it can turn convenience into code [03:25] Lauren Mitchell: execution, especially in the NPX workflow. [03:28] Lauren Mitchell: Their mitigation is practical. [03:30] Lauren Mitchell: Use NPX-dash-no-install, install CLIs explicitly, verify packages exist, and pre-register obvious [03:39] Lauren Mitchell: aliases. [03:40] Nina Park: Let's stitch the themes together. [03:43] Nina Park: Trusted distribution points. [03:44] Nina Park: Package registries are trust at developer speed. [03:48] Nina Park: Edge devices are trust at network speed. [03:50] Nina Park: Defenses look similar. [03:52] Nina Park: Strong publisher controls, scoped tokens, MFA, release monitoring, dependency pinning on the software [03:59] Nina Park: side, and lifecycle management, inventory, and replacement discipline on the infrastructure [04:06] Nina Park: side. [04:06] Lauren Mitchell: And your quick self-check. [04:08] Lauren Mitchell: If you build or deploy crypto-adjacent apps, [04:11] Lauren Mitchell: audit for those specific compromised DYDX versions, [04:14] Lauren Mitchell: hunt for unexpected outbound traffic, [04:17] Lauren Mitchell: and treat secrets as burned. [04:19] Lauren Mitchell: If you run networks, [04:20] Lauren Mitchell: find what's end of support at the edge [04:23] Lauren Mitchell: and budget the replacement, [04:24] Lauren Mitchell: because attackers already have. [04:26] Nina Park: I'm Aaron Cole. [04:28] Nina Park: That's Prime Cyber Insights. [04:29] Nina Park: Move fast, verify trust, [04:31] Nina Park: and don't leave attackers a quiet path in [04:34] Nina Park: through your dependencies or your perimeter. [04:36] Lauren Mitchell: I'm Lauren Mitchell. Thanks for listening. Subscribe for more on supply chain risk, incident response [04:43] Lauren Mitchell: priorities, and the controls that actually reduce blast radius. For the full notes and links, [04:49] Lauren Mitchell: head to pci.neuralnewscast.com. Neural Newscast is AI-assisted, human-reviewed. [04:55] Lauren Mitchell: View our AI transparency policy at neuralnewscast.com.