Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Abuse Google Ads to Steal GoDaddy Manage Users ManageWP
May 7, 2026
Fake Call History Apps on Google Play Steal Payments
May 7, 2026
Malicious NuGet Packages Steal Credentials, SSH Target Browser
May 7, 2026
Home/Threats/Malicious NuGet Packages Steal Credentials, SSH Target Browser
Threats

Malicious NuGet Packages Steal Credentials, SSH Target Browser

A new threat has emerged within the NuGet ecosystem, a widely used registry for .NET developers. Malicious actors have deployed five rogue packages, deceptively posing as legitimate Chinese software...

Sarah simpson
Sarah simpson
May 7, 2026 4 Min Read
1 0

A new threat has emerged within the NuGet ecosystem, a widely used registry for .NET developers. Malicious actors have deployed five rogue packages, deceptively posing as legitimate Chinese software libraries. These packages secretly exfiltrate sensitive data, including browser credentials, SSH private keys, and cryptocurrency wallet information.

The attack takes a clever approach. Instead of creating obviously suspicious packages, the threat actor built each malicious library on top of real, functional code that developers in Chinese enterprise environments would recognize.

By mimicking trusted tools like AntdUI, a popular WinForms component library, the packages appear legitimate enough to pass casual inspection.

Researchers at Socket.dev identified all five packages, published under a single NuGet account named bmrxntfj. The packages accumulated approximately 64,784 downloads across all versions, placing tens of thousands of developer machines and CI/CD build systems at risk. The campaign traces back to at least September 2025, with all five packages still live at the time of writing.

What makes this campaign persistent is the version rotation technique the operator used. Out of 224 total versions published, 219 were deliberately hidden from public search. By keeping only one version visible while regularly swapping in fresh ones, the attacker invalidated hash-based detection and forced security teams to constantly update their blocklists.

Any developer workstation or build server that ran a package restore referencing these five IDs has potentially been exposed since late 2025. That long lifespan and high download count make this one of the more quietly damaging supply chain threats discovered this year.

Malicious NuGet Packages

The payload fires through a .NET module initializer, which the runtime calls automatically when a matching assembly loads. No user interaction is needed beyond a routine package restore. Once triggered, the malware uses JIT hooking to replace the compiler’s dispatch pointer, gaining control over every method compiled afterward.

A second-stage infostealer named we4ftg.exe then executes. It targets saved credentials across 12 Chromium-based browsers including Chrome, Edge, Brave, Firefox, and Opera, collecting passwords, autofill data, session cookies, and payment cards. It handles both legacy and AppBound Chrome encryption formats, confirming the payload has been recently maintained.

The threat actor bmrxntfj NuGet profile showing all five IR packages (Source - Socket.dev)
The threat actor bmrxntfj NuGet profile showing all five IR packages (Source – Socket.dev)

Cryptocurrency assets are a major focus. Browser extension wallets including MetaMask, TronLink, Phantom, Trust Wallet, and Coinbase Wallet are targeted, along with desktop applications like Exodus, Electrum, Atomic, Guarda, Ledger, and Binance. SSH private keys, Outlook profiles, Steam credentials, and files from Documents, Desktop, and Downloads are also collected.

All harvested data is staged under a folder path mimicking a legitimate Microsoft OneDrive directory. Legitimate OneDrive never creates a file by that specific name, making its presence a clear detection signal. Data is then sent to a command-and-control server registered 33 days before the NuGet publishing burst began.

C2 Infrastructure and Attribution

The primary C2 domain resolves to a server in Amsterdam operated through a virtual hosting provider. Its nameservers run through Njalla, a privacy registrar frequently used by threat actors to obstruct takedown requests. The domain was engineered to resemble a legitimate DNS provider so it would blend into routine firewall logs.

A secondary domain linked to an Alibaba Cloud server in Shanghai appears to host the attacker’s development environment. It produced no hits in public malware databases and was not observed receiving stolen data.

Attribution was confirmed through a unique RSA-1024 key embedded in every .NET Reactor-protected package. That same key appeared in four other malicious files on VirusTotal, including memory dumps predating the NuGet campaign by weeks. Labels on those files point to known malware families including Lumma, Quantum, AgentRacoon, and ArrowRAT.

Developers should immediately check project and lock files for any reference to IR.DantUI, IR.Infrastructure.Core, IR.Infrastructure.DataService.Core, IR.iplus32, or IR.OscarUI. Any machine that restored these packages should be treated as compromised, with all credentials, API keys, SSH keys, and wallet seeds rotated. Security teams should configure alerts for connections to the known C2 domain and watch for unexpected file creation at the OneDrive staging path.

Indicators of Compromise (IoCs):-

Type Indicator Description
NuGet Package IR.DantUI Malicious package impersonating AntdUI
NuGet Package IR.Infrastructure.Core Malicious package impersonating Chinese enterprise library
NuGet Package IR.Infrastructure.DataService.Core Malicious package impersonating Chinese enterprise library
NuGet Package IR.iplus32 Malicious package impersonating iplus32 library
NuGet Package IR.OscarUI Malicious package impersonating Chinese UI library
NuGet Account bmrxntfj Threat actor publisher account
Domain dns-providersa2[.]com Primary C2 domain (registered 2026-03-12)
URL https://dns-providersa2[.]com/check C2 beacon and operator validation endpoint
URL https://dns-providersa2[.]com/upload Exfiltration upload endpoint
IP Address 62[.]84[.]102[.]85 VDSINA VPS, ASN 216071, Amsterdam
Domain git[.]justdotrip[.]com Operator development infrastructure (Alibaba Cloud Shanghai)
IP Address 47[.]100[.]60[.]237 Alibaba Cloud Shanghai, operator dev server
Nameserver 1-you.njalla[.]no Njalla nameserver for C2 domain
Nameserver 2-can.njalla[.]in Njalla nameserver for C2 domain
Nameserver 3-get.njalla[.]fo Njalla nameserver for C2 domain
File Path C:ProgramDataMicrosoft OneDrivekeys.dat Malware staging path for harvested data
File Name we4ftg.exe Second-stage infostealer binary
File Name s4.exe Rip-scraper memory dump (live stealer capture)
SHA-256 e1869d6571894f058dd4ab2b66f060628dc364ee8e29afbd2323c95e5002fb8e s4.exe hash
SHA-256 8f7aa15c77bde94087bb74dfc072e25212797b313731b4cad0ded3e152268dcf we4ftg.exe hash
SHA-256 34e2d63b5db7e24c808711c2ca0c0a42afde97a0086d7d81609110c002d18d7c IR.DantUI v2.1.55 encrypted stage-2 resource
SHA-256 b8543b2a1ad8862ebfef18924cf5444d2adfee996939963f4fc2748c582cf9a9 IR.Infrastructure.Core v2.1.55 encrypted stage-2 resource
SHA-256 b8fa1b2fade45304c003909e375d2519ea447b498b7d93fe7c50db014d30f4fa IR.Infrastructure.DataService.Core v2.1.55 encrypted stage-2 resource
SHA-256 019e6c2cf58386039133981f3377b085fbd70c98ae8613c7c6a4f10a9f2d9824 IR.iplus32 v2.1.55 encrypted stage-2 resource
SHA-256 596c453c9dbb7240f1ce05cc025496524ce7c538c23a9b2171174bf32b5691a1 IR.OscarUI v2.1.55 encrypted stage-2 resource
Chrome Extension ID nkbihfbeogaeaoehlefnkodbefgpgknn MetaMask wallet extension
Chrome Extension ID ibnejdfjmmkpcnlpebklmnkoeoihofec TronLink wallet extension
Chrome Extension ID bfnaelmomeimhlpmgjnjophhpkkoljpa Phantom wallet extension
Chrome Extension ID egjidjbpglichdcondbcbdnbeeppgdph Trust Wallet extension
Chrome Extension ID hnfanknocfeofbddgcijnmhnfnkdnaad Coinbase Wallet extension
Git Commit Hash efb675de4b3af3dac3c9cae91075fd7cc2f4f98e Shared commit hash across campaign packages
NuGet Tag Iplusus Shared package tag used across campaign

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarePatchSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical vm2 Node.js Flaws Allow Arbitrary Library Vulnerabilities

Next Post

Fake Call History Apps on Google Play Steal Payments

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Ollama Memory Leak Exposes 300 Vulnerability Servers
May 7, 2026
Microsoft Teams Android: Join Third-Party Meetings via
May 7, 2026
ClickFix Attack Targets macOS with Fake Disk Cleanup Lures
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us