Cybersecurity researchers have found a brand new malicious NuGet package deal that typosquats and impersonates the favored .NET tracing library and its creator to sneak in a cryptocurrency pockets stealer.
The malicious package deal, named “Tracer.Fody.NLog,” remained on the repository for almost six years. It was revealed by a consumer named “csnemess” on February 26, 2020. It masquerades as “Tracer.Fody,” which is maintained by “csnemes.” The package deal continues to stay out there as of writing, and has been downloaded no less than 2,000 occasions, out of which 19 came about during the last six weeks for model 3.2.4.
“It presents itself as a typical .NET tracing integration however in actuality capabilities as a cryptocurrency pockets stealer,” Socket safety researcher Kirill Boychenko mentioned. “Contained in the malicious package deal, the embedded Tracer.Fody.dll scans the default Stratis pockets listing, reads *.pockets.json information, extracts pockets knowledge, and exfiltrates it along with the pockets password to risk actor-controlled infrastructure in Russia at 176.113.82[.]163.”
The software program provide chain safety firm mentioned the risk leveraged numerous techniques that allowed it to elude informal evaluate, together with mimicking the professional maintainer by utilizing a reputation that differs by a single letter (“csnemes” vs. “csnemess”), utilizing Cyrillic lookalike characters within the supply code, and hiding the malicious routine inside a generic helper perform (“Guard.NotNull”) that is used throughout common program execution.
As soon as a venture references the malicious package deal, it prompts its habits by scanning the default Stratis pockets listing on Home windows (“%APPDATA%StratisNodestratisStratisMain”), reads *.pockets.json information and in-memory passwords, and exfiltrates them to the Russian-hosted IP deal with.
“All exceptions are silently caught, so even when the exfiltration fails, the host software continues to run with none seen error whereas profitable calls quietly leak pockets knowledge to the risk actor’s infrastructure,” Boychenko mentioned.
Socket mentioned the identical IP deal with was beforehand put to make use of in December 2023 in connection with one other NuGet impersonation assault wherein the risk actor revealed a package deal named “Cleary.AsyncExtensions” beneath the alias “stevencleary” and included performance to siphon pockets seed phrases. The package deal was so-called to disguise itself because the AsyncEx NuGet library.
The findings as soon as illustrate how malicious typosquats mirroring professional instruments can stealthily function with out attracting any consideration throughout the open-source repository ecosystems.
“Defenders ought to count on to see related exercise and follow-on implants that stretch this sample,” Socket mentioned. “Possible targets embody different logging and tracing integrations, argument validation libraries, and utility packages which can be frequent in .NET tasks.”


