Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读全文,抓住主要信息。 文章讲的是网络安全研究人员发现了一个针对NuGet包管理器的供应链攻击。攻击者利用恶意的Nethereum包(Netherеum.All)来窃取受害者的加密货币钱包密钥。这个包通过替换字母“e”为西里尔字母“e”来欺骗开发者下载。此外,攻击者还伪造了下载量,使其看起来很受欢迎。这个包上传后四天就被下架了。 接下来,我需要将这些关键点浓缩到100字以内。重点包括:供应链攻击、NuGet包管理器、恶意Nethereum包、窃取钱包密钥、字母替换欺骗、伪造下载量等。 最后,确保语言简洁明了,不使用复杂的术语,并且直接描述内容,不加任何开头。 </think> 研究人员发现针对NuGet包管理器的供应链攻击,恶意Nethereum包通过替换字母欺骗开发者下载,并窃取钱包密钥。该包伪造高下载量以提升可信度,在上传四天后被下架。 2025-10-22 11:43:0 Author: thehackernews.com(查看原文) 阅读量:20 收藏

Cryptocurrency / Software Integrity

Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum, a popular Ethereum .NET integration platform, to steal victims' cryptocurrency wallet keys.

The package, Netherеum.All, has been found to harbor functionality to decode a command-and-control (C2) endpoint and exfiltrate mnemonic phrases, private keys, and keystore data, according to security company Socket.

The library was uploaded by a user named "nethereumgroup" on October 16, 2025. It was taken down from NuGet for violating the service's Terms of Use four days later.

What's notable about the NuGet package is that it swaps the last occurrence of the letter "e" with the Cyrillic homoglyph "e" (U+0435) to fool unsuspecting developers into downloading it.

DFIR Retainer Services

In a further attempt to increase the credibility of the package, the threat actors have resorted to artificially inflating the download counts, claiming it has been downloaded 11.7 million times -- a huge red flag given that it's unlikely for an entirely new library to rack up such a high count within a short span of time.

"A threat actor can publish many versions, then script downloads of each .nupkg through the v3 flat-container or loop nuget.exe install and dotnet restore with no-cache options from cloud hosts," security researcher Kirill Boychenko said. "Rotating IPs and user agents and parallelizing requests boosts volume while avoiding client caches."

"The result is a package that appears 'popular,' which boosts placement for searches sorted by relevance and lends a false sense of proof when developers glance at the numbers."

The main payload within the NuGet package is within a function named EIP70221TransactionService.Shuffle, which parses an XOR-encoded string to extract the C2 server (solananetworkinstance[.]info/api/gads) and exfiltrates sensitive wallet data to the attacker.

The threat actor has been found to have previously uploaded another NuGet package called "NethereumNet" with the same deceptive functionality at the start of the month. It has already been removed by the NuGet security team.

CIS Build Kits

This is not the first homoglyph typosquat that has been spotted in the NuGet repository. In July 2024, ReversingLabs documented details of several packages that impersonated their legitimate counterparts by substituting certain elements with their equivalents to bypass casual inspection.

Unlike other open-source package repositories like PyPI, npm, Maven Central, Go Module, and RubyGems that enforce restrictions on the naming scheme to ASCII, NuGet places no such constraints other than prohibiting spaces and unsafe URL characters, opening the door to abuse.

To mitigate such risks, users should carefully scrutinize libraries before downloading them, including verifying publisher identity and sudden download surges, and monitor for anomalous network traffic.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/10/fake-nethereum-nuget-package-used.html
如有侵权请联系:admin#unsafe.sh