Cryptocurrency Stealer Malware Distributed via 13 NuGet Packages

Apr
11,
2023Ravie
LakshmananSoftware
Security
/
Cryptocurrency

Cybersecurity
researchers
have
detailed
the
inner
workings
of
the
cryptocurrency
stealer
malware
that
was
distributed
via
13
malicious
NuGet
packages
as
part
of
a
supply
chain
at

Cryptocurrency Stealer Malware Distributed via 13 NuGet Packages



Apr
11,
2023
Ravie
Lakshmanan
Software
Security
/
Cryptocurrency

Cybersecurity
researchers
have
detailed
the
inner
workings
of
the
cryptocurrency
stealer
malware
that
was
distributed
via
13
malicious
NuGet
packages
as
part
of
a
supply
chain
attack
targeting
.NET
developers.

The
sophisticated
typosquatting
campaign,
which
was

detailed

by
JFrog
late
last
month,
impersonated
legitimate
packages
to
execute
PowerShell
code
designed
to
retrieve
a
follow-on
binary
from
a
hard-coded
server.

The

two-stage
attack

culminates
in
the
deployment
of
a
.NET-based
persistent
backdoor,
called
Impala
Stealer,
which
is
capable
of
gaining
unauthorized
access
to
users’
cryptocurrency
accounts.

“The
payload
used
a
very
rare
obfuscation
technique,
called
‘.NET
AoT
compilation,’
which
is
a
lot
more
stealthy
than
using
‘off
the
shelf’
obfuscators
while
still
making
the
binary
hard
to
reverse
engineer,”
JFrog
told
The
Hacker
News
in
a
statement.

.NET

AoT
compilation

is
an

optimization
technique

that
allows
apps
to
be
ahead-of-time
compiled
to
native
code.
Native
AOT
apps
also
have
faster
startup
time
and
smaller
memory
footprints,
and
can
run
on
a
machine
without
.NET
runtime
installed.

The
second-stage
payload
comes
with
an
auto-update
mechanism
that
enables
it
to
retrieve
new
versions
of
the
executable
from
a
remote
location.
It
further
achieves
persistence
by
injecting
JavaScript
code
into
Discord
or
Microsoft
Visual
Studio
Code
apps,
thereby
activating
the
launch
of
the
stealer
binary.

The
binary
then
proceeds
to
search
for
the
installation
of
the
Exodus
Wallet
desktop
application
and
inserts
JavaScript
code
into
various
HTML
files
in
order
to
harvest
and
exfiltrate
sensitive
data
to
a
hard-coded
Discord
webhook.

The
JavaScript
snippet,
for
its
part,
is
fetched
from
an
online
paste
website
from
where
it’s
already
been
deleted.
That
said,
it’s
suspected
that
the
code
may
have
been
used
to
steal
user
credentials
and
access
other
information
of
interest.

“The
bad
actors
used
typosquatting
techniques
to
deploy
a
custom
malicious
payload
[…]
which
targets
the
Exodus
crypto
wallet
and
leaks
the
victim’s
credentials
to
cryptocurrency
exchanges,
by
using
code
injection,”
Shachar
Menashe,
senior
director
at
JFrog
Security
Research,
said.


UPCOMING
WEBINAR

Learn
to
Secure
the
Identity
Perimeter

Proven
Strategies

Improve
your
business
security
with
our
upcoming
expert-led
cybersecurity
webinar:
Explore
Identity
Perimeter
strategies!

Don’t
Miss
Out

Save
Your
Seat!

“Our
investigation
proves
no
open
source
software
repository
is
completely
trust-worthy,
so
safety
measures
should
be
taken
at
every
step
of
the
software
development
lifecycle
to
ensure
the
software
supply
chain
remains
secure.”

The
findings
come
as
Phylum
unearthed
a
malicious
npm
package
named
mathjs-min
that
was
uploaded
to
the
repository
on
March
26,
2023,
and
found
to
harbor
a
credential
stealer
that
grabs
Discord
passwords
from
the
official
app
as
well
as
web
browsers
like
Google
Chrome,
Brave,
and
Opera.

“This
package
is
actually
a
modified
version
of
the
widely
used
Javascript
math
library
mathjs,
and
was
injected
with
malicious
code
after
being
forked,”
the
software
supply
chain
security
firm

said
.
“The
modified
version
was
then
published
to
NPM
with
the
intention
of
passing
it
off
as
a
minified
version
of
the
genuine
mathjs
library.”

Found
this
article
interesting?
Follow
us
on

Twitter


and

LinkedIn

to
read
more
exclusive
content
we
post.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.