Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Crypto Stealer: .NET Supply Chain Attack

April 11, 2023
Reading Time: 2 mins read
in Alerts

A supply chain attack targeting .NET developers has been detailed by cybersecurity researchers, exposing the inner workings of the cryptocurrency stealer malware that was distributed via 13 malicious NuGet packages. The campaign impersonated legitimate packages to execute PowerShell code and retrieve a follow-on binary from a hard-coded server.

The two-stage attack culminates in the deployment of a .NET-based persistent backdoor called Impala Stealer, which can gain unauthorized access to users’ cryptocurrency accounts.

The payload used a rare obfuscation technique, called ‘.NET AoT compilation,’ to make the binary hard to reverse engineer while being more stealthy than using off-the-shelf obfuscators.

Furthermore, native AOT apps have faster startup time and smaller memory footprints, and can run on a machine without .NET runtime installed. The second-stage payload is designed with an auto-update mechanism that can retrieve new versions of the executable from a remote location, and it achieves persistence by injecting JavaScript code into Discord or Microsoft Visual Studio Code apps, activating the launch of the stealer binary.

Additionally, the bad actors used typosquatting techniques to deploy a custom malicious payload, which targets the Exodus crypto wallet and leaks the victim’s credentials to cryptocurrency exchanges using code injection.

At the same time, security experts warn that no open-source software repository is completely trustworthy, and safety measures should be taken at every step of the software development lifecycle to ensure the software supply chain remains secure.

The malware was uncovered as Phylum found a malicious npm package named mathjs-min that was uploaded to the repository on March 26, 2023, and was found to harbor a credential stealer that grabs Discord passwords from the official app and web browsers like Google Chrome, Brave, and Opera.

Reference:
  • Analyzing Impala Stealer – Payload of the first NuGet attack campaign

Tags: .NETApril 2023CryptocurrencyCyber AlertCyber Alerts 2023Cyber AttacksPowerShellVulnerabilities
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial