Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

Posted on December 16, 2025December 16, 2025 By CWS

Dec 16, 2025Ravie LakshmananCybersecurity / Cryptocurrency
Cybersecurity researchers have found a brand new malicious NuGet package deal that typosquats and impersonates the favored .NET tracing library and its writer to sneak in a cryptocurrency pockets stealer.
The malicious package deal, named “Tracer.Fody.NLog,” remained on the repository for almost six years. It was printed by a consumer named “csnemess” on February 26, 2020. It masquerades as “Tracer.Fody,” which is maintained by “csnemes.” The package deal continues to stay out there as of writing, and has been downloaded not less than 2,000 instances, out of which 19 befell during the last six weeks for model 3.2.4.

“It presents itself as a regular .NET tracing integration however in actuality capabilities as a cryptocurrency pockets stealer,” Socket safety researcher Kirill Boychenko stated. “Contained in the malicious package deal, the embedded Tracer.Fody.dll scans the default Stratis pockets listing, reads *.pockets.json information, extracts pockets knowledge, and exfiltrates it along with the pockets password to menace actor-controlled infrastructure in Russia at 176.113.82[.]163.”
The software program provide chain safety firm stated the menace leveraged a lot of techniques that allowed it to elude informal evaluation, together with mimicking the authentic maintainer by utilizing a reputation that differs by a single letter (“csnemes” vs. “csnemess”), utilizing Cyrillic lookalike characters within the supply code, and hiding the malicious routine inside a generic helper operate (“Guard.NotNull”) that is used throughout common program execution.

As soon as a undertaking references the malicious package deal, it prompts its conduct by scanning the default Stratis pockets listing on Home windows (“%APPDATA%StratisNodestratisStratisMain”), reads *.pockets.json information and in-memory passwords, and exfiltrates them to the Russian-hosted IP deal with.
“All exceptions are silently caught, so even when the exfiltration fails, the host software continues to run with none seen error whereas profitable calls quietly leak pockets knowledge to the menace actor’s infrastructure,” Boychenko stated.

Socket stated the identical IP deal with was beforehand put to make use of in December 2023 in reference to one other NuGet impersonation assault during which the menace actor printed a package deal named “Cleary.AsyncExtensions” underneath the alias “stevencleary” and included performance to siphon pockets seed phrases. The package deal was so-called to disguise itself because the AsyncEx NuGet library.
The findings as soon as illustrate how malicious typosquats mirroring authentic instruments can stealthily function with out attracting any consideration throughout the open-source repository ecosystems.
“Defenders ought to anticipate to see comparable exercise and follow-on implants that stretch this sample,” Socket stated. “Doubtless targets embody different logging and tracing integrations, argument validation libraries, and utility packages which are frequent in .NET tasks.”

The Hacker News Tags:Cryptocurrency, Data, NuGet, Package, Poses, Rogue, Steals, Tracer.Fody, Wallet

Post navigation

Previous Post: CISO Communities – Cybersecurity’s Secret Weapon
Next Post: Top 3 SOC Bottlenecks and How to Solve Them  

Related Posts

DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware The Hacker News
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems The Hacker News
Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware The Hacker News
Assessing the Role of AI in Zero Trust The Hacker News
What Security Leaders Need to Know About AI Governance for SaaS The Hacker News
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • From Open Source to OpenAI: The Evolution of Third-Party Risk
  • Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026
  • Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
  • Top 3 SOC Bottlenecks and How to Solve Them  
  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • From Open Source to OpenAI: The Evolution of Third-Party Risk
  • Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026
  • Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
  • Top 3 SOC Bottlenecks and How to Solve Them  
  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark