• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
rogue nuget packages infect .net developers with crypto stealing malware

Rogue NuGet Packages Infect .NET Developers with Crypto-Stealing Malware

You are here: Home / General Cyber Security News / Rogue NuGet Packages Infect .NET Developers with Crypto-Stealing Malware
March 22, 2023

The NuGet repository is the concentrate on of a new “innovative and very-destructive attack” aiming to infect .NET developer techniques with cryptocurrency stealer malware.

The 13 rogue offers, which were downloaded additional than 160,000 situations more than the previous thirty day period, have since been taken down.

“The packages contained a PowerShell script that would execute upon set up and cause a download of a ‘second stage’ payload, which could be remotely executed,” JFrog scientists Natan Nehorai and Brian Moussalli said.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Whilst NuGet packages have been in the past identified to consist of vulnerabilities and be abused to propagate phishing one-way links, the advancement marks the first-ever discovery of packages with destructive code.

A few of the most downloaded packages – Coinbase.Core, Anarchy.Wrapper.Net, and DiscordRichPresence.API – on your own accounted for 166,000 downloads, while it’s also possible that the danger actors artificially inflated the down load counts employing bots to make them look a lot more authentic.

The use of Coinbase and Discord underscores the ongoing reliance on typosquatting approaches, in which phony deals are assigned names that are identical to respectable deals, in order to trick builders into downloading them.

The malware included in just the software package packages functions as a dropper script and is developed to quickly run a PowerShell code that retrieves a comply with-on binary from a tricky-coded server.

As an additional obfuscation system, some offers did not embed a destructive payload directly, instead fetching it by means of another booby-trapped package deal as a dependency.

Even a lot more troublingly, the connection to the command-and-management (C2) server takes place about HTTP (as opposed to HTTPS), rendering it susceptible to an adversary-in-the-middle (AiTM) attack.

The 2nd-stage malware is what JFrog describes as a “fully personalized executable payload” that can be dynamically switched at will given that it’s retrieved from the C2 server.

WEBINARDiscover the Hidden Risks of 3rd-Party SaaS Applications

Are you mindful of the pitfalls affiliated with 3rd-party application access to your company’s SaaS apps? Sign up for our webinar to study about the kinds of permissions getting granted and how to lessen risk.

RESERVE YOUR SEAT

The 2nd-phase provides many capabilities that involve a crypto stealer and an auto-updater module that pings the C2 server for an current model of the malware.

The results appear as the software program supply chain has come to be an significantly rewarding pathway to compromise developers’ systems and stealthily propagate backdoored code to downstream customers.

“This proves that no open source repository is harmless from destructive actors,” Shachar Menashe, senior director at JFrog Security Analysis, said in a statement shared with The Hacker Information.

“.NET builders using NuGet are still at superior risk of malicious code infecting their environments and really should take warning when curating open up-supply components for use in their builds – and at each individual phase of the software package growth lifecycle – to make sure the software program provide chain stays protected.”

Observed this report intriguing? Abide by us on Twitter  and LinkedIn to study more special written content we post.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «new naplistener malware used by ref2924 group to evade network New NAPLISTENER Malware Used by REF2924 Group to Evade Network Detection
Next Post: Ransomware Attacks Double in Europe’s Transport Sector Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
  • Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities
  • 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
  • Romania’s Safetech Leans into UK Cybersecurity Market
  • New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
  • Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
  • Advanced Phishing Attacks Surge 356% in 2022
  • Expo Framework API Flaw Reveals User Data in Online Services
  • NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure
  • Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry

Copyright © TheCyberSecurity.News, All Rights Reserved.