Cryptocurrency Stealer Malware Distributed via 13 NuGet Packages


Apr 11, 2023Ravie LakshmananSoftware Security / Cryptocurrency

Cybersecurity researchers have detailed the inner workings of the cryptocurrency stealer malware that was distributed via 13 malicious NuGet packages as part of a supply chain attack targeting .NET developers.

The sophisticated typosquatting campaign, which was detailed by JFrog late last month, impersonated legitimate packages to execute PowerShell code designed to retrieve a follow-on binary from a hard-coded server.

The two-stage attack culminates in the deployment of a .NET-based persistent backdoor, called Impala Stealer, which is capable of gaining unauthorized access to users’ cryptocurrency accounts.

“The payload used a very rare obfuscation technique, called ‘.NET AoT compilation,’ which is a lot more stealthy than using ‘off the shelf’ obfuscators while still making the binary hard to reverse engineer,” JFrog told The Hacker News in a statement.

.NET AoT compilation is an optimization technique that allows apps to be ahead-of-time compiled to native code. Native AOT apps also have faster startup time and smaller memory footprints, and can run on a machine without .NET runtime installed.

The second-stage payload comes with an auto-update mechanism that enables it to retrieve new versions of the executable from a remote location. It further achieves persistence by injecting JavaScript code into Discord or Microsoft Visual Studio Code apps, thereby activating the launch of the stealer binary.

Cryptocurrency Stealer Malware

The binary then proceeds to search for the installation of the Exodus Wallet desktop application and inserts JavaScript code into various HTML files in order to harvest and exfiltrate sensitive data to a hard-coded Discord webhook.

The JavaScript snippet, for its part, is fetched from an online paste website from where it’s already been deleted. That said, it’s suspected that the code may have been used to steal user credentials and access other information of interest.

“The bad actors used typosquatting techniques to deploy a custom malicious payload […] which targets the Exodus crypto wallet and leaks the victim’s credentials to cryptocurrency exchanges, by using code injection,” Shachar Menashe, senior director at JFrog Security Research, said.

UPCOMING WEBINAR

Learn to Secure the Identity Perimeter – Proven Strategies

Improve your business security with our upcoming expert-led cybersecurity webinar: Explore Identity Perimeter strategies!

Don’t Miss Out – Save Your Seat!

“Our investigation proves no open source software repository is completely trust-worthy, so safety measures should be taken at every step of the software development lifecycle to ensure the software supply chain remains secure.”

The findings come as Phylum unearthed a malicious npm package named mathjs-min that was uploaded to the repository on March 26, 2023, and found to harbor a credential stealer that grabs Discord passwords from the official app as well as web browsers like Google Chrome, Brave, and Opera.

“This package is actually a modified version of the widely used Javascript math library mathjs, and was injected with malicious code after being forked,” the software supply chain security firm said. “The modified version was then published to NPM with the intention of passing it off as a minified version of the genuine mathjs library.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.





Source link