Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (2,946)
  • Analysis (3,083)
  • Bitcoin (3,691)
  • Blockchain (2,157)
  • DeFi (2,619)
  • Ethereum (2,499)
  • Event (111)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (2,714)
  • Press Releases (11)
  • Reddit (2,375)
  • Regulation (2,461)
  • Security (3,551)
  • Thought Leadership (3)
  • Uncategorized (2)
  • Videos (43)
Hand picked
  • $150 Oil is coming. The Strait of Hormuz “Black Swan” is officially here. 3 Maneuvers to survive the NYSE open
  • UNITAS is available for exchange!
  • RENDER: Can it break the $1.88 barrier after 109% volume increase?
  • TOKEN2049 Dubai postponed to April 2027 due to regional security concerns
  • Ethereum faces resistance at $2,100 as derivatives show bearish sentiment
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Altcoins»A new phishing scheme targets future crypto on Mexc exchange
Altcoins

A new phishing scheme targets future crypto on Mexc exchange

April 15, 2025No Comments
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
1f6a8.png
Share
Facebook Twitter LinkedIn Pinterest Email


THE Jfrog The security research team warned against a malicious package targeting future crypto Mexc Exchange, seeking to steal funds and flee trading references.

The team published a report on April 15 detailing the “CCXt-Mexc-Futures” package, which uses the legitimate cryptocurrency exchange trading library (CCXT) to redirect user trading requests to a malicious server.

🚨 New security research alert: the JFROG #Security The team found a phishing scheme in the Python Package Index (Pypi) index targeting trading Crypto, which reached $ 1.67 billion in the first quarter of 2025. A malicious package redirects users to a fake Mexc (promoted to… pic.twitter.com/uuyalkszbw

– Jfrog (@jfrog) April 15, 2025

The malicious party establishes an area, very similar to that legitimate. In this case, a user can confuse the false Mexc domain for a legitimate area.

Once a victim falls into the trap, attackers can divert all the cryptographic and sensitive information contained in the trading request.

Consequently, attackers can also steal touches and application interface secrets (API). Subsequently, this compromises Crypto trading accounts.

According to the researchers, “the use of obscure techniques and a fake Mexc website also demonstrates the sophistication of this phishing campaign.” The false website is even promoted to Facebook.

Source: Jfrog

Meanwhile, by entering in more detail, JFROG explains that the CCXT-Mexc-Futures package claims to prolong the crypto trading capabilities via the cryptocurrency (CCXT) exchange trading.

It is a python package with legitimate and popular crypto trading which supports trading on many scholarships, including Mexc.

However, the attackers claim that the malicious package extends the legitimate CCXT package to support the trade of “future” on Mexc.

Instead, to achieve its objectives, the malicious package replaces three relevant functions: describe, sign and prepare_request_headers.

You might also love
A new malicious campaign targets atomic and exodus portfolios

Add, rewrite, redirect, steal cryptographic future

The report continues by explaining that the Mexc interface in CCXT defines a large set of API to support different types of trading. The attackers targeted two of these APIs: contract_private_post_order_submit And contract_private_post_order_cancel.

Once the malicious package CCXT-mexc-futures replaces these two APIs, it adds a third, Spot4_private_post_orde_place.

Consequently, users create, place or cancel trading orders via these APIs which represent the legitimate APIs of the CCXT library.

“Each time a user uses these entries, instead of using the inputs defined by CCXT, he will use the attacker’s entries, specifying trading in the request,” according to the researchers.

Source: Jfrog

In particular, the attackers went even further. They made sure that a “Badrequest” response turns into a “commands” response, so that users think that the order has passed.

In addition, as the malicious package replaces the sign function, if a user tries to communicate with Mexc using the package, requests will go to the false domain.

This also means sending the user token to the attackers’ request.

If the user token is not provided, the package will ask the user to add it before placing a command.

“If this is not an entry linked to the future, the package directs the flow to the original Mexc Exchange implementation of the CCXT package,” notes the report.

Meanwhile, the researchers discovered two versions of the malicious package. They use different methods to hide and run arbitrary code on the victim’s computer who installed the package.

However, the two methods are “very common means for attackers to hide and execute malicious useful loads”.

In response to this threat, Jfrog says that he added the malicious Python packages to Jfrog Xray to allow users to detect them immediately.

You might also love
Crypto mining malware and open source malicious packages have doubled at T1 2025

The post-New PHISHING diagram targets future crypto on Mexc Exchange appeared first on Cryptonews.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDogecoin whales buy 800 million Doges in 48 hours – smart currency or bull trap?
Next Article Bitcoin vs. M2 world money remains optimistic to push the price again above $ 100,000

Related Posts

Altcoins

RENDER: Can it break the $1.88 barrier after 109% volume increase?

March 13, 2026
Altcoins

Crypto exchange AAVE costs nearly $50 million lost: ETH MEV pocketed $9.9 million

March 13, 2026
Altcoins

Mastercard Adds Polygon Payments: Assessing On-Chain Impact

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

Istanbul Blockchain Week Launches Institutional Markets Summit: Pioneering Institutional Adoption of Digital Assets

March 12, 2026

Istanbul, Türkiye – March, 2026 – Istanbul Blockchain Week announces the launch of The Institutional…

Event

HIPTHER Baltics Launches in Vilnius with Agenda Revealing Lithuania’s 2026 Regulatory Reset

March 10, 2026

Vilnius, Lithuania — HIPTHER officially announces the agenda for HIPTHER Baltics: Vilnius 2026, the inaugural event of its…

1 2 3 … 77 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

RENDER: Can it break the $1.88 barrier after 109% volume increase?

March 13, 2026

Crypto exchange AAVE costs nearly $50 million lost: ETH MEV pocketed $9.9 million

March 13, 2026

Mastercard Adds Polygon Payments: Assessing On-Chain Impact

March 13, 2026
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2026 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 72,635.00
ethereum
Ethereum (ETH) $ 2,157.72
tether
Tether (USDT) $ 1.00
bnb
BNB (BNB) $ 670.14
xrp
XRP (XRP) $ 1.42
usd-coin
USDC (USDC) $ 0.99992
solana
Solana (SOL) $ 90.77
tron
TRON (TRX) $ 0.289893
figure-heloc
Figure Heloc (FIGR_HELOC) $ 1.01
staked-ether
Lido Staked Ether (STETH) $ 2,265.05