Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章讲的是发现了四个恶意的NuGet包,专门针对ASP.NET开发人员,窃取敏感数据。这些包的名字是NCryptYo、DOMOAuth2_、IRAOAuth2.0和SimpleWriter_。它们是从8月12日到21日上传的,上传者是hamzazaheer,已经被下架了,但下载量超过4500次。 这些包的功能包括建立本地代理、窃取身份数据、创建后门以及文件写入和隐藏进程执行。攻击者的目标不是直接控制开发者的机器,而是通过控制应用的授权层,在生产环境中持续窃取数据和权限。 此外,文章还提到了另一个恶意npm包ambar-src的情况,但用户只要求总结关于NuGet包的部分。所以重点放在四个NuGet包及其功能上。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖恶意软件的数量、目标、功能以及攻击目的。 可能的结构:发现四个恶意NuGet包针对ASP.NET开发人员窃取敏感数据;功能包括建立代理、窃取数据、创建后门;攻击者通过控制授权层在生产环境中持续活动。 现在组织语言:四个恶意NuGet包针对ASP.NET开发者窃取敏感数据,功能包括建立本地代理、窃取身份信息、创建后门及文件操作;攻击者通过控制授权层在生产环境中持续活动。 检查字数是否合适,并确保没有使用“文章内容总结”之类的开头。 </think> 研究人员发现四个恶意NuGet包针对ASP.NET开发者窃取敏感数据。这些包通过建立本地代理、窃取身份信息和创建后门等方式危害应用安全。攻击者利用授权层控制,在应用部署后持续活动以获取权限并创建持久后门。 2026-2-25 12:43:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Package Dropped Malware

Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data.

The campaign, discovered by Socket, exfiltrates ASP.NET Identity data, including user accounts, role assignments, and permission mappings, as well as manipulates authorization rules to create persistent backdoors in victim applications.

The names of the packages are listed below -

  • NCryptYo
  • DOMOAuth2_
  • IRAOAuth2.0
  • SimpleWriter_

The NuGet packages were published to the repository between August 12 and 21, 2024, by a user named hamzazaheer. They have since been taken down from the repository following responsible disclosure, but not before attracting more than 4,500 downloads.

According to the software supply chain security company, NCryptYo acts as a first-stage dropper that establishes a local proxy on localhost:7152 that relays traffic to an attacker-controlled command-and-control (C2) server whose address is dynamically retrieved at runtime. It's worth noting that NCryptYo attempts to masquerade as the legitimate NCrypto package.

DOMOAuth2_ and IRAOAuth2.0 steal Identity data and backdoor apps, while SimpleWriter_ features unconditional file writing and hidden process execution capabilities while presenting itself as a PDF conversion utility. An analysis of package metadata has revealed identical build environments, indicating that the campaign is the work of a single threat actor.

"NCryptYo is a stage-1 execution-on-load dropper," security researcher Kush Pandya said. "When the assembly loads, its static constructor installs JIT compiler hooks that decrypt embedded payloads and deploy a stage-2 binary - a localhost proxy on port 7152 that relays traffic between the companion packages and the attacker's external C2 server, whose address is resolved dynamically at runtime."

Once the proxy is active, DOMOAuth2_ and IRAOAuth2.0 begin transmitting the ASP.NET Identity data through the local proxy to the external infrastructure. The C2 server responds with authorization rules that are then processed by the application to create a persistent backdoor by granting themselves admin roles, modifying access controls, or disabling security checks. SimpleWriter_, for its part, writes threat actor-controlled content to disk and executes the dropped binary with hidden windows.

Malicious NuGet Packages

It's not exactly clear how users are tricked into downloading these packages, as the attack chain kicks in only after all four of them are installed.

"The campaign's objective is not to compromise the developer's machine directly, but to compromise the applications they build," Pandya explained. "By controlling the authorization layer during development, the threat actor gains access to deployed production applications."

"When the victim deploys their ASP.NET application with the malicious dependencies, the C2 infrastructure remains active in production, continuously exfiltrating permission data and accepting modified authorization rules. The threat actor or a buyer can then grant themselves admin-level access to any deployed instance."

The disclosure comes as Tenable disclosed details of a malicious npm package named ambar-src that amassed more than 50,000 downloads before it was removed from the JavaScript registry. It was uploaded to npm on February 13, 2026.

The package makes use of npm's preinstall script hook to trigger the execution of malicious code contained within index.js during its installation. The malware is designed to run a one-liner command that obtains different payloads from the domain "x-ya[.]ru" based on the operating system -

  • On Windows, it downloads and executes a file called msinit.exe containing encrypted shellcode, which is decoded and loaded into memory.
  • On Linux, it fetches a bash script and executes it. The bash script then retrieves another payload from the same server, an ELF binary that works as an SSH-based reverse shell client.
  • On macOS, it fetches another script that uses osascript to run JavaScript responsible for dropping Apfell, a JavaScript for Automation (JXA) agent part of the Mythic C2 framework that can conduct reconnaissance, collect screenshots, steal data from Google Chrome, and capture system passwords by displaying a fake prompt.

"It employs multiple techniques to evade detection, and drops open-source malware with advanced capabilities, targeting developers on Windows, Linux, and macOS hosts," the company said.

Once the data is collected, it's exfiltrated to the attacker to a Yandex Cloud domain in an effort to blend in with legitimate traffic and take advantage of the fact that trusted services are less likely to be blocked within corporate networks.

Ambar-src is assessed to be a more mature variant of eslint-verify-plugin, another rogue npm package that was recently flagged by JFrog as dropping Mythic agents Poseidon and Apfell on Linux and macOS systems.

"If this package is installed or running on a computer, that system must be considered fully compromised," Tenable said. "While the package should be removed, please be aware that because an external entity may have gained full control of the computer, removing the package does not guarantee the elimination of all resulting malicious software."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/malicious-nuget-packages-stole-aspnet.html
如有侵权请联系:admin#unsafe.sh