Posted in

Malicious NuGet Packages Compromise 64K+ Developer Systems

A stealthy supply chain attack is quietly spreading through the .NET ecosystem, targeting developers and build pipelines with malicious NuGet packages disguised as legitimate libraries.

Security researchers have uncovered five rogue packages that have already accumulated over 64,000 downloads, exposing developer machines, CI/CD systems, and enterprise environments to serious compromise.

Unlike typical malware campaigns, this attack is not loud or obvious. It operates silently—embedded inside trusted development workflows—making it one of the most dangerous threats facing modern software teams today.


The “Trusted Dependency” Trap

The attackers behind this campaign didn’t rely on fake or broken packages. Instead, they took a smarter approach:

👉 They built malicious packages on top of real, functional code

By mimicking well-known libraries like AntdUI and other enterprise tools used in Chinese development environments, the packages looked legitimate enough to pass casual inspection.

This creates a dangerous illusion:
Developers think they’re installing a useful dependency…
But they’re actually introducing a backdoor into their system.


The Silent Execution: No User Interaction Needed

The infection doesn’t rely on phishing, downloads, or clicks.

It starts with a routine developer action:

👉 Running a NuGet package restore

Once the malicious package is loaded:

  • A .NET module initializer executes automatically
  • No warning or prompt appears
  • The payload runs in the background

This means even cautious developers can be compromised without realizing it.


The Version Rotation Trick That Evaded Detection

One of the most advanced aspects of this campaign is how it avoided detection for months.

The attacker published:

  • 224 total versions of malicious packages
  • 219 hidden from public view
  • Only one visible version at a time

By constantly rotating versions, the attacker effectively:

  • Broke hash-based detection tools
  • Forced security teams to constantly update blocklists
  • Extended the life of the campaign undetected

👉 The result: a persistent attack active since September 2025


What Happens After Infection

Once inside a system, the malware deploys a second-stage infostealer called we4ftg.exe.

This payload goes after high-value data across the entire machine.


What Data Gets Stolen

This isn’t basic credential theft—it’s a full data harvesting operation.

Browser and session data:

  • Chrome, Edge, Brave, Firefox, Opera
  • Saved passwords
  • Autofill data
  • Session cookies
  • Payment card details

Cryptocurrency wallets:

  • MetaMask, Trust Wallet, Phantom, Coinbase Wallet
  • Desktop apps like Exodus, Electrum, Atomic

Developer and system assets:

  • SSH private keys
  • Outlook profiles
  • Steam credentials
  • Files from Desktop, Documents, Downloads

👉 In short: everything attackers need for identity theft, lateral movement, and financial fraud


Persistence and Stealth Techniques

To avoid detection, the malware uses stealthy persistence methods:

  • Stores stolen data in a folder mimicking Microsoft OneDrive
  • Uses file names that appear legitimate at first glance
  • Maintains silent background execution

However, one key detection clue exists:

👉 The specific file created in the OneDrive path is something real OneDrive never generates

This makes it a valuable indicator of compromise (IoC) for security teams.


Infrastructure Built to Blend In

The attacker carefully designed the backend infrastructure to avoid suspicion:

  • Domains crafted to resemble legitimate services
  • Hosting through trusted data centers
  • Privacy-focused registrars to delay takedown efforts

Even the command-and-control (C2) domain blends into normal traffic, making detection harder within enterprise environments.


Why This Attack Is a Bigger Deal Than It Looks

This campaign highlights a major shift in cybersecurity:

👉 Developers are now prime targets

Instead of attacking users, threat actors are compromising:

  • Developer workstations
  • Build pipelines
  • Software dependencies

This creates a ripple effect, where a single infected package could impact multiple downstream applications and organizations.


Real-World Risks

The potential damage from this attack goes beyond a single system:

  • Compromised CI/CD pipelines
  • Exposure of API keys and secrets
  • Unauthorized code injection
  • Financial loss via crypto wallet theft
  • Enterprise-wide breaches

👉 One compromised developer machine = potential supply chain breach


Immediate Action Required

If your environment has used these packages, treat it as a critical security incident.

Steps to take immediately:

  • Remove all malicious dependencies
  • Rotate all credentials and API keys
  • Replace SSH keys
  • Secure crypto wallets
  • Audit all build and deployment pipelines

Key Warning Signs

Security teams should look for:

  • Unexpected files in OneDrive-like directories
  • Suspicious outbound network activity
  • Unusual behavior during compilation
  • Unauthorized access to credential stores

Monitoring developer environments is now just as important as securing production systems.


The Bigger Lesson: Supply Chain Is the New Battlefield

This attack reinforces a critical reality:

👉 Modern cyberattacks don’t break into systems…
👉 They get installed as dependencies

Open-source ecosystems and package registries are now a major attack surface.

And trust is being weaponized.


Conclusion

With over 64,000 downloads and months of undetected activity, this malicious NuGet campaign is one of the clearest examples of how supply chain attacks are evolving.

For developers and organizations, the takeaway is simple:

👉 Trust nothing by default—even your dependencies

Because in today’s threat landscape, the most dangerous code
is the code you willingly install.

Leave a Reply

Your email address will not be published. Required fields are marked *