Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Delayed Payloads Hit Nuget Packages

November 11, 2025
Reading Time: 3 mins read
in Alerts
Delayed Payloads Hit Nuget Packages

Socket’s Threat Research Team discovered nine malicious NuGet packages, published between 2023 and 2024 by the user “shanhai666,” designed to deploy payloads that disrupt databases and industrial systems. According to Socket, these packages were downloaded 9,488 times. The core danger lies in their functionality: almost all of them contain fully operational code that appears legitimate but bundles concealed malware. This malware weaponizes standard C# extension methods, such as .Exec and .BeginTran, to intercept operations and check for hardcoded or encrypted trigger dates before executing their sabotage mechanisms.

The most dangerous package identified is Sharp7Extend, a typosquat of the legitimate Sharp7 library, which targets industrial PLCs. This package is particularly destructive because it uses dual sabotage mechanisms. First, it immediately begins terminating processes randomly with a 20% probability. Second, it silently causes 80% of write operations to fail without any error messages, starting 30 to 90 minutes after installation. This hidden data corruption affects safety-critical components like actuators, setpoints, and production controls in manufacturing and industrial automation environments, making detection extremely difficult.

The attack strategically targets the three major database providers used in .NET applications—SQL Server, PostgreSQL, and SQLite—in addition to industrial PLCs. The database packages, including SqlUnicorn.Core and MyDbRepository, are set for time-delayed activation. For instance, one SQL Server build activates on August 8, 2027, and other database builds trigger on November 29, 2028. The Sharp7Extend package, however, activates immediately and continues its destructive action until June 6, 2028. This long gap between installation and activation, which can be up to three years, is a sophisticated technique designed to maximize stealth and potential impact.

The threat actor used various evasion tactics, including varying the packages’ metadata to hide connections, though all used the alias “shanhai666.” Furthermore, malformed digital signatures and the presence of Chinese-language comments within the code strongly suggest a Chinese origin for the threat actor. This combination of delayed triggers, probabilistic execution, and silent corruption is highly sophisticated and rarely seen in supply chain attacks, as it makes systemic attacks appear as random crashes or hardware failures.

This campaign highlights an advanced level of supply chain attack complexity. The long delay for database malware means that developers who installed the package in 2024 will likely have moved to other projects or companies by the 2027-2028 trigger dates, making attribution and forensic analysis nearly impossible. Socket shared its findings with NuGet on November 5, 2025, and the platform confirmed that they are investigating and taking steps to remove the malicious packages.

Reference:

  • Nuget Packages Use Delayed Payloads To Disrupt Databases And Industrial Systems
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Delayed Payloads Hit Nuget Packages

Glassworm Found In Three VS Code Addons

November 11, 2025
Delayed Payloads Hit Nuget Packages

Triofox Flaw Lets Hackers Install Remote

November 11, 2025
Lost iPhone Beware Fake Text Claims

Samsung Flaw Used To Install Landfall

November 10, 2025
Lost iPhone Beware Fake Text Claims

ClickFix Phishing Targets Hotel Systems

November 10, 2025
Lost iPhone Beware Fake Text Claims

Lost iPhone Beware Fake Text Claims

November 10, 2025
Gootloader Returns With New Tricks

Malicious VS Code Extension Found

November 7, 2025

Latest Alerts

Glassworm Found In Three VS Code Addons

Triofox Flaw Lets Hackers Install Remote

Delayed Payloads Hit Nuget Packages

Samsung Flaw Used To Install Landfall

ClickFix Phishing Targets Hotel Systems

Lost iPhone Beware Fake Text Claims

Subscribe to our newsletter

    Latest Incidents

    Italian Adviser Targeted By Paragon Spyware

    Manassas Schools Close After Cyberattack

    Chinese Breach Exposes Cyber Weapons

    Oracle EBS Hack Hits Nearly 30 Victims

    China Hackers Target US Nonprofit

    Hackers Steal Sonicwall Cloud Backups

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial