← Back to Pulse Feed
PULSE DETAIL
PULSE NAME
Polymarket Trader Funds at Risk: DPRK npm Package Steals Wallet Keys and Installs SSH Backdoor
On April 10, 2026, a malicious npm package named sleek-pretty@1.0.0 was published, targeting developers running automated trading bots on Polymarket, a prediction market platform with $477 million in open interest. The package executes four attack chains upon import: system fingerprinting, SSH backdoor installation on Linux hosts, filesystem exfiltration, and targeted theft of Polymarket CLOB API credentials and Ethereum/Polygon wallet private keys. The payload runs at require() time without install hooks and specifically hunts SDK source files like createClobClient.ts and clob.ts. An SSH public key is written to authorized_keys for persistent access. The attacker can drain USDC balances directly using stolen L1 private keys. Attribution points to DPRK's Famous Chollima (Lazarus Group) based on TTPs matching the TraderTraitor campaign and publisher email correlation with known DPRK infrastructure.
MITRE ATT&CK & Malware Families
MALWARE FAMILIES
sleek-pretty
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| URL | http://api.mywalletsss.store/api/validate/system-info | — | 2026-04-13 | |
| URL | https://api.mywalletsss.store/api/validate/files | — | 2026-04-13 | |
| URL | https://api.mywalletsss.store/api/validate/project-env | — | 2026-04-13 | |
| URL | https://api.mywalletsss.store/api/validate/system-info | — | 2026-04-13 | |
| domain | mywalletsss.store | — | 2026-04-13 | |
| hostname | api.mywalletsss.store | — | 2026-04-13 |