Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
嗯,用户让我用中文总结一下这篇文章,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写文章描述即可。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是网络安全研究人员发现了一个新的恶意软件包,伪装成Stripe公司的库,试图攻击金融行业。这个包的名字是StripeApi.Net,模仿了合法的Stripe.net库,下载量超过7500万次。上传者是StripePayments,时间是2026年2月16日,现在已经下架。 接下来,恶意包的页面设计得很像官方的Stripe.net包,使用相同的图标和几乎相同的readme文件,只是把“Stripe.net”改成了“Stripe-net”。攻击者还虚增了下载量到18万多次,分506个版本发布。每个版本平均下载300次左右。 这个恶意包复制了合法库的一些功能,但修改了关键方法来收集和传输敏感数据,包括用户的Stripe API令牌。其余代码保持完整功能,所以开发者可能不会怀疑。ReversingLabs很快发现了这个包,并报告后导致它被下架,在造成严重损害前就被处理了。 此外,文章提到这次活动标志着从之前的针对加密货币生态系统的活动转向攻击金融行业。ReversingLabs的专家指出,误下载这个恶意库的开发者应用仍能正常运行和处理支付,但敏感数据会被悄悄窃取。 现在需要把这些信息浓缩到100字以内。重点包括:恶意软件包伪装成Stripe库、上传日期、页面设计模仿、虚增下载量、窃取API令牌、未造成严重损害、攻击目标转向金融行业。 可能的结构:恶意软件包伪装成Stripe库上传至NuGet Gallery,模仿官方页面设计和功能窃取API令牌。攻击者虚增下载量至18万次分506版本发布。该包被迅速发现并下架,在造成严重损害前阻止。此次事件显示攻击目标转向金融行业。 </think> 一个恶意软件包伪装成Stripe公司的合法库上传至NuGet Gallery, 企图通过模仿官方页面设计和功能窃取用户API令牌, 攻击者虚增下载量至18万次分506版本发布, 该包被迅速发现并下架, 此次事件显示网络攻击目标转向金融行业. 2026-2-26 10:9:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Malware / Software Security

Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial sector.

The package, codenamed StripeApi.Net, attempts to masquerade as Stripe.net, a legitimate library from Stripe that has over 75 million downloads. It was uploaded by a user named StripePayments on February 16, 2026. The package is no longer available.

"The NuGet page for the malicious package is set up to resemble the official Stripe.net package as closely as possible," ReversingLabs Petar Kirhmajer said. "It uses the same icon as the legitimate package and contains a nearly identical readme, only swapping the 'Stripe.net' references to read 'Stripe-net.'"

In a further effort to lend credibility to the typosquatted package, the threat actor behind the campaign is said to have artificially inflated the download count to more than 180,000. But in an interesting twist, the downloads were split across 506 versions, with each version recording about 300 downloads on average.

The package replicates some of the legitimate Stripe package's functionality, but also modifies certain critical methods to collect and transfer sensitive data, including the user's Stripe API token, back to the threat actor. With the rest of the codebases remaining fully functional, it's unlikely to attract any suspicion from unsuspecting developers who may have inadvertently downloaded it.

ReversingLabs said it discovered and reported the package "relatively soon" after it was initially released, causing it to be taken before it could inflict any serious damage.

The software supply chain security company also noted that the activity marks a shift from prior campaigns that have leveraged bogus NuGet packages to target the cryptocurrency ecosystem and facilitate wallet key theft.

"Developers who mistakenly download and integrate a typosquatted library like StripeAPI.net will still have their applications compile successfully and function as intended," Kirhmajer said. "Payments would process normally and, from the developer’s perspective, nothing would appear broken. In the background, however, sensitive data is being secretly copied and exfiltrated by malicious actors."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/malicious-stripeapi-nuget-package.html
如有侵权请联系:admin#unsafe.sh