• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Malicious NuGet Packages Caught Distributing SeroXen RAT Malware

You are here: Home / Cyber Security News / Malicious NuGet Packages Caught Distributing SeroXen RAT Malware

Cybersecurity researchers have uncovered a new set of malicious offers published to the NuGet package manager working with a lesser-recognised approach for malware deployment.

Software package supply chain security firm ReversingLabs described the marketing campaign as coordinated and ongoing because August 1, 2023, whilst linking it to a host of rogue NuGet deals that had been observed providing a distant entry trojan known as SeroXen RAT.

“The danger actors behind it are tenacious in their need to plant malware into the NuGet repository, and to continuously publish new destructive deals,” Karlo Zanki, reverse engineer at ReversingLabs, said in a report shared with The Hacker News.

The names of some of the deals are below –

  • Pathoschild.Stardew.Mod.Construct.Config
  • KucoinExchange.Net
  • Kraken.Exchange
  • DiscordsRpc
  • SolanaWallet
  • Monero
  • Modern.Winform.UI
  • MinecraftPocket.Server
  • IAmRoot
  • ZendeskApi.Customer.V2
  • Betalgo.Open.AI
  • Forge.Open.AI
  • Pathoschild.Stardew.Mod.BuildConfig
  • CData.NetSuite.Net.Framework
  • CData.Salesforce.Net.Framework
  • CData.Snowflake.API

These packages, which span a number of versions, imitate well-liked deals and exploit NuGet’s MSBuild integrations function in get to implant malicious code on their victims, a feature termed inline tasks to obtain code execution.

“This is the 1st acknowledged illustration of malware printed to the NuGet repository exploiting this inline duties feature to execute malware,” Zanki claimed.

The now-taken out deals show equivalent features in that the risk actors behind the procedure attempted to conceal the malicious code by producing use of spaces and tabs to transfer it out of look at of the default monitor width.

As earlier disclosed by Phylum, the packages also have artificially inflated downloaded counts to make them show up far more genuine. The ultimate purpose of the decoy packages is to act as a conduit for retrieving a 2nd-stage .NET payload hosted on a throwaway GitHub repository.

“The threat actor guiding this campaign is remaining mindful and shelling out interest to particulars, and is identified to hold this destructive marketing campaign alive and active,” Zanki reported.

Observed this posting intriguing? Observe us on Twitter  and LinkedIn to study extra exclusive articles we submit.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « PentestPad: Platform for Pentest Teams
Next Post: Arid Viper Targeting Arabic Android Users with Spyware Disguised as Dating App »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

Copyright © 2025 · AllTech.News, All Rights Reserved.