Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Over 80,000 Microsoft Entra ID accounts targeted using open source team filtration tools

Family File Suit Challenges Arkansas Law Requiring 10 Commandments to be posted in classrooms

The chime price IPO is $27 per share, valuing Fintech at $11.6 billion

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Malicious PYPI packages target MEXC trading APIs to steal credentials and redirect orders
Identity

Malicious PYPI packages target MEXC trading APIs to steal credentials and redirect orders

userBy userApril 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 15, 2025Ravi LakshmananSupply Chain Attacks/Malware

Malicious PYPI Package Targets

Cybersecurity researchers have disclosed malicious packages uploaded to a Python Package Index (PYPI) repository designed to steal transaction orders posted on MEXC Cryptocurrency Exchange with malicious servers.

The package, CCXT-MEXC-Futures, claims to be an extension built on top of the popular Python library named CCXT (short for cryptocurrency exchange trading).

Malicious packages are no longer available on Pypi, but Pepy.tech statistics show that they have been downloaded at least 1,065 times.

“The authors of the malicious CCXT-MEXC-FUTURES package claim in their README file that they will extend the CCXT package to support ‘futures’ trading in MEXC,” says Korolevski, a researcher at JFROG, in a report shared with Hacker News.

Cybersecurity

However, a deeper look into the library revealed that it specifically overrides the two APIs associated with the MEXC interface -Contract_Private_Post_order_Submit and contract_post_order_cancel-, introducing a new name named Spot4_private_post_order_place.

In doing so, you trick the developer into invoking these API endpoints to create, cancel or place transaction orders in MEXC Exchange, and stealthly perform malicious actions in the background.

The malicious changes are specifically targeted at three different MEXC-related features that exist in the original CCXT library. Describe, sign, and prepare dextlive_Request_Headers.

This allows you to run arbitrary code on the local machine where the package is installed and effectively retrieve the JSON payload from a fake domain that is impersonating MEXC (“v3.mexc.workers[.]dev “), which includes configurations that direct overridden APIs towards malicious third-party platforms (” Greentreeone[.]com “) in contrast to the actual MEXC website.

“The package creates an entry in the API for MEXC integration.[.]”Mexc site not mexc.com, not com,” Korolevsky said.

“All requests will be redirected to the domain set by the attacker and can hijack all the victim’s crypto tokens, including API keys and secrets, and all the sensitive information transferred in the request.”

Additionally, the rogue package is designed to send MEXC API keys and secret keys to domains controlled by attackers.

Users who have installed ccxt-mexc-futures are advised to cancel potentially compromised tokens and remove packages with immediate effect.

This development occurs because Socket reveals that it is taking advantage of counterfeit packages across the NPM, PYPI, GO, and Maven ecosystem to launch an inverse shell to maintain persistence and extend data.

Cybersecurity

“An unsuspecting developer or organization may incorrectly include vulnerabilities or malicious dependencies in the codebase.

It also follows new research that delves into the potential for large-scale language models (LLMS) powering generative artificial intelligence (AI) tools to risk the software supply chain by hallucinating non-existent packages and recommending them to developers.

Malicious Pypi Packages

A supply chain threat arises when a malicious actor registers and publishes hallucination names, registers and publishes malware-covered packages in an open source repository, infects the developer system in the process.

Academic studies show that “the average percentage of hallucination packages is at least 5.2% for the commercial model and 21.7% for the open source model, including a staggering 205,474 unique examples of hallucination package names, further highlighting the severity and prevalence of this threat.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMmgy appoints UK EVP and Managing Director
Next Article Waves of “Coordinated Attacks” Target French prisons | Crime News
user
  • Website

Related Posts

Over 80,000 Microsoft Entra ID accounts targeted using open source team filtration tools

June 12, 2025

Former Black Busta members use Microsoft team and Python scripts in the 2025 attack

June 11, 2025

295 Malicious IPS launches a coordinated brute force attack against ApacheTomcat manager

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Over 80,000 Microsoft Entra ID accounts targeted using open source team filtration tools

Family File Suit Challenges Arkansas Law Requiring 10 Commandments to be posted in classrooms

The chime price IPO is $27 per share, valuing Fintech at $11.6 billion

What is the most popular casino in the US?

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

What is the most popular casino in the US?

Top 10 Startup and Tech Funding News – June 11, 2025

Huawei launches Pura 80 series and challenges Apple in China’s premium phone market

Israeli AI AI Data Security Startup Cyera raises $540 million and doubles its valuation to $600 million in seven months

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.