Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

Posted on December 16, 2025December 16, 2025 By CWS

Dec 16, 2025Ravie LakshmananCybersecurity / Cryptocurrency
Cybersecurity researchers have found a brand new malicious NuGet package deal that typosquats and impersonates the favored .NET tracing library and its writer to sneak in a cryptocurrency pockets stealer.
The malicious package deal, named “Tracer.Fody.NLog,” remained on the repository for almost six years. It was printed by a consumer named “csnemess” on February 26, 2020. It masquerades as “Tracer.Fody,” which is maintained by “csnemes.” The package deal continues to stay out there as of writing, and has been downloaded not less than 2,000 instances, out of which 19 befell during the last six weeks for model 3.2.4.

“It presents itself as a regular .NET tracing integration however in actuality capabilities as a cryptocurrency pockets stealer,” Socket safety researcher Kirill Boychenko stated. “Contained in the malicious package deal, the embedded Tracer.Fody.dll scans the default Stratis pockets listing, reads *.pockets.json information, extracts pockets knowledge, and exfiltrates it along with the pockets password to menace actor-controlled infrastructure in Russia at 176.113.82[.]163.”
The software program provide chain safety firm stated the menace leveraged a lot of techniques that allowed it to elude informal evaluation, together with mimicking the authentic maintainer by utilizing a reputation that differs by a single letter (“csnemes” vs. “csnemess”), utilizing Cyrillic lookalike characters within the supply code, and hiding the malicious routine inside a generic helper operate (“Guard.NotNull”) that is used throughout common program execution.

As soon as a undertaking references the malicious package deal, it prompts its conduct by scanning the default Stratis pockets listing on Home windows (“%APPDATA%StratisNodestratisStratisMain”), reads *.pockets.json information and in-memory passwords, and exfiltrates them to the Russian-hosted IP deal with.
“All exceptions are silently caught, so even when the exfiltration fails, the host software continues to run with none seen error whereas profitable calls quietly leak pockets knowledge to the menace actor’s infrastructure,” Boychenko stated.

Socket stated the identical IP deal with was beforehand put to make use of in December 2023 in reference to one other NuGet impersonation assault during which the menace actor printed a package deal named “Cleary.AsyncExtensions” underneath the alias “stevencleary” and included performance to siphon pockets seed phrases. The package deal was so-called to disguise itself because the AsyncEx NuGet library.
The findings as soon as illustrate how malicious typosquats mirroring authentic instruments can stealthily function with out attracting any consideration throughout the open-source repository ecosystems.
“Defenders ought to anticipate to see comparable exercise and follow-on implants that stretch this sample,” Socket stated. “Doubtless targets embody different logging and tracing integrations, argument validation libraries, and utility packages which are frequent in .NET tasks.”

The Hacker News Tags:Cryptocurrency, Data, NuGet, Package, Poses, Rogue, Steals, Tracer.Fody, Wallet

Post navigation

Previous Post: CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks
Next Post: Top 3 SOC Bottlenecks and How to Solve Them  

Related Posts

The Evolution of UTA0388’s Espionage Malware The Hacker News
From MCPs and Tool Access to Shadow API Key Sprawl The Hacker News
CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation The Hacker News
New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users The Hacker News
Introducing Astrix’s AI Agent Control Plane The Hacker News
TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks
  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers
  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks
  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers
  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark