Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (1,409)
  • Analysis (1,594)
  • Bitcoin (2,181)
  • Blockchain (1,279)
  • DeFi (1,502)
  • Ethereum (1,489)
  • Event (56)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (1,546)
  • Press Releases (1)
  • Reddit (832)
  • Regulation (1,444)
  • Security (2,065)
  • Thought Leadership (2)
  • Videos (41)
Hand picked
  • U.S. Senate Passes GENIUS Act to Regulate Stablecoins, Marking Crypto Industry Win
  • ChainLink transfers $ 149 million in Binance – another post -uncomsessor rally?
  • Injective Flamps 12% – Evaluate if you have to buy inj
  • Bitcoin changes: Saylor targets $ 21 million by 2046
  • The American Senate adopts the draft law on the stable engineer
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Altcoins»A new phishing scheme targets future crypto on Mexc exchange
Altcoins

A new phishing scheme targets future crypto on Mexc exchange

April 15, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
1f6a8.png
Share
Facebook Twitter LinkedIn Pinterest Email


THE Jfrog The security research team warned against a malicious package targeting future crypto Mexc Exchange, seeking to steal funds and flee trading references.

The team published a report on April 15 detailing the “CCXt-Mexc-Futures” package, which uses the legitimate cryptocurrency exchange trading library (CCXT) to redirect user trading requests to a malicious server.

🚨 New security research alert: the JFROG #Security The team found a phishing scheme in the Python Package Index (Pypi) index targeting trading Crypto, which reached $ 1.67 billion in the first quarter of 2025. A malicious package redirects users to a fake Mexc (promoted to… pic.twitter.com/uuyalkszbw

– Jfrog (@jfrog) April 15, 2025

The malicious party establishes an area, very similar to that legitimate. In this case, a user can confuse the false Mexc domain for a legitimate area.

Once a victim falls into the trap, attackers can divert all the cryptographic and sensitive information contained in the trading request.

Consequently, attackers can also steal touches and application interface secrets (API). Subsequently, this compromises Crypto trading accounts.

According to the researchers, “the use of obscure techniques and a fake Mexc website also demonstrates the sophistication of this phishing campaign.” The false website is even promoted to Facebook.

Source: Jfrog

Meanwhile, by entering in more detail, JFROG explains that the CCXT-Mexc-Futures package claims to prolong the crypto trading capabilities via the cryptocurrency (CCXT) exchange trading.

It is a python package with legitimate and popular crypto trading which supports trading on many scholarships, including Mexc.

However, the attackers claim that the malicious package extends the legitimate CCXT package to support the trade of “future” on Mexc.

Instead, to achieve its objectives, the malicious package replaces three relevant functions: describe, sign and prepare_request_headers.

You might also love
A new malicious campaign targets atomic and exodus portfolios

Add, rewrite, redirect, steal cryptographic future

The report continues by explaining that the Mexc interface in CCXT defines a large set of API to support different types of trading. The attackers targeted two of these APIs: contract_private_post_order_submit And contract_private_post_order_cancel.

Once the malicious package CCXT-mexc-futures replaces these two APIs, it adds a third, Spot4_private_post_orde_place.

Consequently, users create, place or cancel trading orders via these APIs which represent the legitimate APIs of the CCXT library.

“Each time a user uses these entries, instead of using the inputs defined by CCXT, he will use the attacker’s entries, specifying trading in the request,” according to the researchers.

Source: Jfrog

In particular, the attackers went even further. They made sure that a “Badrequest” response turns into a “commands” response, so that users think that the order has passed.

In addition, as the malicious package replaces the sign function, if a user tries to communicate with Mexc using the package, requests will go to the false domain.

This also means sending the user token to the attackers’ request.

If the user token is not provided, the package will ask the user to add it before placing a command.

“If this is not an entry linked to the future, the package directs the flow to the original Mexc Exchange implementation of the CCXT package,” notes the report.

Meanwhile, the researchers discovered two versions of the malicious package. They use different methods to hide and run arbitrary code on the victim’s computer who installed the package.

However, the two methods are “very common means for attackers to hide and execute malicious useful loads”.

In response to this threat, Jfrog says that he added the malicious Python packages to Jfrog Xray to allow users to detect them immediately.

You might also love
Crypto mining malware and open source malicious packages have doubled at T1 2025

The post-New PHISHING diagram targets future crypto on Mexc Exchange appeared first on Cryptonews.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDogecoin whales buy 800 million Doges in 48 hours – smart currency or bull trap?
Next Article Bitcoin vs. M2 world money remains optimistic to push the price again above $ 100,000

Related Posts

Altcoins

Injective Flamps 12% – Evaluate if you have to buy inj

June 23, 2025
Altcoins

Solana (Sol) and Aptos (Apt) appointed best candidates for the proposed stable token program of Wyoming

June 23, 2025
Altcoins

The Wood Cathie Ark sells $ 146 million in circle shares in the middle of 250% rally – what stimulates the outing?

June 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

Philippine Blockchain Week 2025 Welcomes Global Web3 Trailblazers to Manila

June 9, 2025

Manila, Philippines – June 9, 2025 — As Philippine Blockchain Week (PBW) 2025 returns for…

Event

ETHMilan 2025 Returns With a Stellar Line-Up at One of Milan’s Most Iconic Venues

June 5, 2025

Milan, Italy – Mark your calendars! ETHMilan, Italy’s largest international Ethereum and Web3 conference, is…

1 2 3 … 49 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Injective Flamps 12% – Evaluate if you have to buy inj

June 23, 2025

Solana (Sol) and Aptos (Apt) appointed best candidates for the proposed stable token program of Wyoming

June 23, 2025

The Wood Cathie Ark sells $ 146 million in circle shares in the middle of 250% rally – what stimulates the outing?

June 22, 2025
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2025 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 102,003.33
ethereum
Ethereum (ETH) $ 2,253.17
tether
Tether (USDT) $ 1.00
xrp
XRP (XRP) $ 2.03
bnb
BNB (BNB) $ 623.03
solana
Solana (SOL) $ 134.49
usd-coin
USDC (USDC) $ 1.00
tron
TRON (TRX) $ 0.267212
dogecoin
Dogecoin (DOGE) $ 0.154592
staked-ether
Lido Staked Ether (STETH) $ 2,251.23