Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

Posted on December 16, 2025December 16, 2025 By CWS

Dec 16, 2025Ravie LakshmananCybersecurity / Cryptocurrency
Cybersecurity researchers have found a brand new malicious NuGet package deal that typosquats and impersonates the favored .NET tracing library and its writer to sneak in a cryptocurrency pockets stealer.
The malicious package deal, named “Tracer.Fody.NLog,” remained on the repository for almost six years. It was printed by a consumer named “csnemess” on February 26, 2020. It masquerades as “Tracer.Fody,” which is maintained by “csnemes.” The package deal continues to stay out there as of writing, and has been downloaded not less than 2,000 instances, out of which 19 befell during the last six weeks for model 3.2.4.

“It presents itself as a regular .NET tracing integration however in actuality capabilities as a cryptocurrency pockets stealer,” Socket safety researcher Kirill Boychenko stated. “Contained in the malicious package deal, the embedded Tracer.Fody.dll scans the default Stratis pockets listing, reads *.pockets.json information, extracts pockets knowledge, and exfiltrates it along with the pockets password to menace actor-controlled infrastructure in Russia at 176.113.82[.]163.”
The software program provide chain safety firm stated the menace leveraged a lot of techniques that allowed it to elude informal evaluation, together with mimicking the authentic maintainer by utilizing a reputation that differs by a single letter (“csnemes” vs. “csnemess”), utilizing Cyrillic lookalike characters within the supply code, and hiding the malicious routine inside a generic helper operate (“Guard.NotNull”) that is used throughout common program execution.

As soon as a undertaking references the malicious package deal, it prompts its conduct by scanning the default Stratis pockets listing on Home windows (“%APPDATA%StratisNodestratisStratisMain”), reads *.pockets.json information and in-memory passwords, and exfiltrates them to the Russian-hosted IP deal with.
“All exceptions are silently caught, so even when the exfiltration fails, the host software continues to run with none seen error whereas profitable calls quietly leak pockets knowledge to the menace actor’s infrastructure,” Boychenko stated.

Socket stated the identical IP deal with was beforehand put to make use of in December 2023 in reference to one other NuGet impersonation assault during which the menace actor printed a package deal named “Cleary.AsyncExtensions” underneath the alias “stevencleary” and included performance to siphon pockets seed phrases. The package deal was so-called to disguise itself because the AsyncEx NuGet library.
The findings as soon as illustrate how malicious typosquats mirroring authentic instruments can stealthily function with out attracting any consideration throughout the open-source repository ecosystems.
“Defenders ought to anticipate to see comparable exercise and follow-on implants that stretch this sample,” Socket stated. “Doubtless targets embody different logging and tracing integrations, argument validation libraries, and utility packages which are frequent in .NET tasks.”

The Hacker News Tags:Cryptocurrency, Data, NuGet, Package, Poses, Rogue, Steals, Tracer.Fody, Wallet

Post navigation

Previous Post: CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks
Next Post: Top 3 SOC Bottlenecks and How to Solve Them  

Related Posts

Cybercrime Trends: Codespaces Exploits and More Cybercrime Trends: Codespaces Exploits and More The Hacker News
CISA Directs Agencies to Remove Outdated Edge Devices CISA Directs Agencies to Remove Outdated Edge Devices The Hacker News
Credential-Stealing Attack Hits SAP npm Packages Credential-Stealing Attack Hits SAP npm Packages The Hacker News
How to Gain Control of AI Agents and Non-Human Identities How to Gain Control of AI Agents and Non-Human Identities The Hacker News
What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive The Hacker News
Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark