Cybersecurity researchers have uncovered a brand new set of malicious packages revealed to the NuGet bundle supervisor utilizing a lesser-known technique for malware deployment.
Software program provide chain safety agency ReversingLabs described the marketing campaign as coordinated and ongoing since August 1, 2023, whereas linking it to a host of rogue NuGet packages that have been noticed delivering a distant entry trojan referred to as SeroXen RAT.
“The risk actors behind it are tenacious of their want to plant malware into the NuGet repository, and to constantly publish new malicious packages,” Karlo Zanki, reverse engineer at ReversingLabs, stated in a report shared with The Hacker Information.
The names of a number of the packages are under –
- Pathoschild.Stardew.Mod.Construct.Config
- KucoinExchange.Internet
- Kraken.Trade
- DiscordsRpc
- SolanaWallet
- Monero
- Fashionable.Winform.UI
- MinecraftPocket.Server
- IAmRoot
- ZendeskApi.Shopper.V2
- Betalgo.Open.AI
- Forge.Open.AI
- Pathoschild.Stardew.Mod.BuildConfig
- CData.NetSuite.Internet.Framework
- CData.Salesforce.Internet.Framework
- CData.Snowflake.API
These packages, which span a number of variations, imitate fashionable packages and exploit NuGet’s MSBuild integrations function as a way to implant malicious code on their victims, a function referred to as inline duties to realize code execution.
“That is the primary recognized instance of malware revealed to the NuGet repository exploiting this inline duties function to execute malware,” Zanki stated.
The now-removed packages exhibit related traits in that the risk actors behind the operation tried to hide the malicious code by making use of areas and tabs to maneuver it out of view of the default display width.
As beforehand disclosed by Phylum, the packages even have artificially inflated downloaded counts to make them seem extra reliable. The final word aim of the decoy packages is to behave as a conduit for retrieving a second-stage .NET payload hosted on a throwaway GitHub repository.
“The risk actor behind this marketing campaign is being cautious and listening to particulars, and is decided to maintain this malicious marketing campaign alive and lively,” Zanki stated.


