Malicious NuGet Packages Stole ASP.NET Data While npm Package Delivered Malware

Cybersecurity analysts have uncovered four harmful NuGet packages designed to infiltrate ASP.NET development environments and secretly extract sensitive application data. The campaign, identified by Socket, focused on compromising applications during development rather than directly attacking developers’ machines.

The rogue packages were uploaded to the official NuGet repository between August 12 and 21, 2024, by a user operating under the name hamzazaheer. Although they were later removed following responsible disclosure, they collectively recorded more than 4,500 downloads before being taken down.

Malicious Package Names and Capabilities

The four identified packages include:

  • NCryptYo
  • DOMOAuth2_
  • IRAOAuth2.0
  • SimpleWriter_

Security researchers determined that all four shared identical build environments, strongly suggesting they were created by a single threat actor.

Stage One Dropper and Proxy Setup

NCryptYo functioned as the initial infection vector. It acted as a stage one dropper that installed a local proxy on localhost port 7152. This proxy relayed communication between infected applications and an attacker controlled command and control server.

Notably, NCryptYo attempted to impersonate the legitimate NCrypto package, increasing the likelihood of accidental installation.

When loaded, the assembly triggered a static constructor that installed JIT compiler hooks. These hooks decrypted embedded payloads and launched a second stage binary that enabled communication with external infrastructure.

ASP.NET Identity Data Theft and Persistent Backdoors

Once the local proxy was active, DOMOAuth2_ and IRAOAuth2.0 began extracting ASP.NET Identity data. This included:

  • User account details
  • Role assignments
  • Permission mappings

The stolen information was transmitted through the local proxy to the remote C2 server. In response, the server issued manipulated authorization rules, which were processed by the application itself.

This mechanism allowed attackers to:

  • Grant themselves administrator privileges
  • Alter access control policies
  • Disable security validations

The result was a persistent backdoor embedded directly within deployed production environments.

SimpleWriter_ contributed additional capabilities, including unrestricted file writing and hidden process execution, while posing as a PDF conversion utility.

Researchers emphasized that the ultimate goal was long term control of production applications, not the compromise of individual developer systems.

Malicious npm Package Infects Windows, Linux, and macOS

In a separate but related supply chain threat, Tenable disclosed a malicious npm package named ambar-src that accumulated over 50,000 downloads before being removed from the registry. The package was published on February 13, 2026.

malware window

The malware exploited npm’s preinstall script hook to execute malicious code during installation.

Cross Platform Payload Delivery

The attack logic differed by operating system:

  • Windows
    Downloaded msinit.exe containing encrypted shellcode that was decrypted and executed in memory.
  • Linux
    Retrieved a bash script that downloaded an ELF binary functioning as an SSH based reverse shell.
  • macOS
    Executed a script using osascript to deploy Apfell, a JavaScript for Automation agent associated with the Mythic framework. Apfell can capture screenshots, extract Google Chrome data, and collect system credentials.

To reduce suspicion, exfiltrated data was sent to infrastructure hosted on Yandex Cloud domains, blending malicious traffic with legitimate services.

Security analysts assess ambar-src as an evolved version of another rogue npm package previously flagged for deploying Mythic agents on Linux and macOS systems.

Full System Compromise Warning

Experts warn that any system where the malicious npm package was installed should be considered fully compromised. Removing the package alone does not guarantee elimination of all secondary payloads or backdoors.

The dual disclosures highlight the growing threat posed by software supply chain attacks targeting developers. By inserting malicious dependencies into trusted repositories, threat actors can quietly infiltrate production systems at scale.




Found this article interesting? Follow us on  X (Twitter) FacebookBlue sky and LinkedIn to read more exclusive content we post.