Four Malicious NuGet Packages Target ASP.NET Developers With JIT Hooking and Credential Exfiltration
A NuGet supply chain attack involving four malicious packages targeting ASP.NET web application developers has been discovered. The campaign deploys a multi-stage payload where NCryptYo acts as a dropper, establishing a local proxy, while companion packages exfiltrate ASP.NET Identity data and accept threat actor-controlled authorization rules, creating backdoors in victim applications. The packages, published between August 12-21, 2024, have accumulated over 4,500 downloads. The attack uses obfuscation, JIT compiler manipulation, and a two-stage architecture to evade detection. The campaign's objective is to compromise applications during development, gaining access to deployed production instances by controlling the authorization layer.
Pulse ID: 699d5baa21c5722498f88433
Pulse Link: https://otx.alienvault.com/pulse/699d5baa21c5722498f88433
Pulse Author: AlienVault
Created: 2026-02-24 08:04:58
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #InfoSec #NET #NuGet #OTX #OpenThreatExchange #Proxy #RAT #SupplyChain #Troll #bot #developers #AlienVault
