Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Polymarket Trader Funds at Risk: DPRK npm Package Steals Wallet Keys and Installs SSH Backdoor

0
Medium
Published: Mon Apr 13 2026 (04/13/2026, 15:11:52 UTC)
Source: AlienVault OTX General

Description

A malicious npm package named sleek-pretty@1. 0. 0 was published on April 10, 2026, targeting developers using automated trading bots on Polymarket. The package executes multiple attack chains immediately upon import, including system fingerprinting, installation of an SSH backdoor on Linux hosts, filesystem data exfiltration, and theft of Polymarket CLOB API credentials and Ethereum/Polygon wallet private keys. The attacker gains persistent access by adding an SSH public key to authorized_keys and can directly drain USDC balances using stolen private keys. Attribution links this campaign to the DPRK's Lazarus Group based on tactics, techniques, and procedures (TTPs) and infrastructure correlations. No official patch or remediation guidance is currently available, and no known exploits in the wild have been reported.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/13/2026, 16:32:01 UTC

Technical Analysis

The threat involves a malicious npm package, sleek-pretty@1.0.0, which targets developers running trading bots on Polymarket by executing a multi-stage attack upon import. The attack includes system fingerprinting, installing an SSH backdoor on Linux systems for persistent access, exfiltrating filesystem data, and stealing API credentials and private keys related to Polymarket's CLOB API and Ethereum/Polygon wallets. The attacker writes an SSH public key to authorized_keys to maintain access and can use stolen private keys to drain USDC balances. The campaign is attributed to the DPRK's Lazarus Group based on matching TTPs and publisher email infrastructure. There is no indication of a patch or fix, and the service is not cloud-hosted, so remediation depends on user action.

Potential Impact

The impact includes unauthorized persistent access to affected Linux hosts via an SSH backdoor, exfiltration of sensitive filesystem data, theft of Polymarket CLOB API credentials, and Ethereum/Polygon wallet private keys. This enables the attacker to directly drain USDC cryptocurrency balances from compromised wallets. The compromise affects developers using the malicious npm package, potentially leading to significant financial loss and system compromise.

Mitigation Recommendations

No official patch or remediation guidance is currently available. Users should immediately audit their npm dependencies for the presence of the sleek-pretty@1.0.0 package and remove it if found. Review and revoke any compromised API credentials and wallet private keys. Inspect Linux hosts for unauthorized SSH keys in authorized_keys and remove any suspicious entries. Rotate all affected credentials and wallet keys. Monitor for unusual SSH access and consider rebuilding compromised systems. Patch status is not yet confirmed — check vendor advisories or npm security channels for updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://panther.com/blog/polymarket-trader-funds-at-risk-dprk-npm-package-steals-wallet-keys"]
Adversary
Famous Chollima
Pulse Id
69dd07b82c8afdcdfda7a898
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://api.mywalletsss.store/api/validate/system-info
urlhttps://api.mywalletsss.store/api/validate/files
urlhttps://api.mywalletsss.store/api/validate/project-env
urlhttps://api.mywalletsss.store/api/validate/system-info

Domain

ValueDescriptionCopy
domainmywalletsss.store
domainapi.mywalletsss.store

Threat ID: 69dd171882d89c981f125412

Added to database: 4/13/2026, 4:17:28 PM

Last enriched: 4/13/2026, 4:32:01 PM

Last updated: 4/14/2026, 8:14:29 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses