BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Impala Stealer: another cryptocurrency thief has reached the developers, this time through the NuGet platform

    How secure are public software repositories in general?

    Cybersecurity researchers recently discovered cryptocurrency-stealing malware that was distributed through the NuGet developer platform disguised as 13 fake packages.

    The sophisticated typesquatting campaign, described in detail by JFrog experts, consisted of attackers presenting their malware as popular legitimate packages often used by developers. The effect was achieved by copying the names of these popular packages, albeit with minor changes. And since even legitimate packages often have complicated names, it doesn't cost anything for developers to accidentally confuse packages and download malware onto a computer.

    The two-stage attack culminated in the deployment of a permanent .NET-based "Impala Stealer" backdoor capable of gaining unauthorized access to victims' cryptocurrency wallet accounts.

    "The payload used a very rare obfuscation technique called .NET AoT Compilation, which is much more stealthy than using off-the-shelf obfuscators, but also makes it difficult to reverse engineer the binary," JFrog said in a statement.

    .NET AoT Compilation is an optimization technique that lets you pre-compile applications to native code. Native AoT applications start faster and require less memory, and can also run on a machine without the .NET runtime installed.

    The second stage payload comes with an automatic update mechanism that allows you to get new versions of the executable from a remote location. In addition, the mechanism ensures that the malware persists on the victim's system by injecting JavaScript code into Discord applications or Microsoft Visual Studio Code, thereby activating the launch of the stealer binary.

    The binary then proceeds to look for the installed Exodus Wallet desktop app and injects JavaScript code into various HTML files to collect and exfiltrate sensitive data into Discord's hard-coded webhook.

    “The attackers used typesquatting techniques to deploy a custom malicious payload that targeted the Exodus crypto wallet,” said Shachar Menashe, senior director at JFrog Security Research.

    Downloading malicious packages to the platforms used by developers has already become commonplace. For example, shortly before the JFrog report, Phylum researchers discovered a malicious package named mathjs-min in the NPM service. The package contained a credential thief that grabbed passwords from the official Discord app, as well as web browsers such as Google Chrome, Brave, and Opera.

    “Our investigation proves that no open source software repository is completely trustworthy, so security measures must be taken at every stage of the software development life cycle to ensure the security of the software supply chain,” JFrog concluded.
    Author DeepWeb
    A major cloud provider has been cyberattacked due to a bug in the Linux kernel
    China is developing covert cyberweapons to hijack US satellites

    Comments 0

    Add comment