Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns

February 26, 2026

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

February 26, 2026

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

February 25, 2026
Facebook X (Twitter) Instagram
Thursday, February 26
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Malicious NuGet Package Targets Stripe Developers
News

Malicious NuGet Package Targets Stripe Developers

Team-CWDBy Team-CWDFebruary 25, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A malicious NuGet package designed to mimic Stripe’s official .NET library has been uncovered by cybersecurity researchers, marking a shift in tactics from earlier cryptocurrency-focused campaigns to the broader financial sector.

The package, named StripeApi.Net, impersonated Stripe.net, the legitimate helper library used to integrate Stripe payments into Microsoft .NET applications.

With more than 74 million downloads, Stripe.net is widely adopted by developers building payment, billing and subscription systems. This made the malicious package particularly dangerous.

Typosquatting Campaign Targets Developers

According to a new advisory by ReversingLabs, rather than attempting to breach Stripe’s official package, the threat actors used typosquatting and published a similarly named package to trick developers into installing it.

The fake listing closely resembled the genuine NuGet page. It used the same icon, near-identical documentation and matching tags.

The publisher name, “StripePayments,” was chosen to appear credible, though the account retained the default NuGet profile image instead of Stripe’s logo.

Researchers said that the malicious package showed more than 180,000 downloads. However, they also noted that figures appear to have been artificially inflated.

Instead of accumulating large download counts across a small number of versions, the threat actors spread roughly 300 downloads each across 506 versions to create the impression of steady use.

Hidden Code Exfiltrated API Keys

A deeper inspection revealed that the package contained largely legitimate Stripe code, but with subtle modifications. Critical methods were altered to capture API tokens when the StripeClient class was initialized.

Read more on attacks targeting Stripe customers: Stripe API Skimming Campaign Unveils New Techniques for Theft 

Once obtained, the stolen API keys and a machine identifier were transmitted to a Supabase database controlled by the attackers. Supabase provides managed PostgreSQL services, making it convenient as data collection infrastructure.

Despite the inflated download count, ReversingLabs said it is unlikely any developers were compromised. The company reported the package shortly after its publication on February 16, and NuGet administrators removed it shortly after receiving the notification. An examination of the associated Supabase database found no stolen tokens, only a test entry.

ReversingLabs warned that the incident highlights persistent third-party risk in modern software development. 

“The increasing frequency of such campaigns requires a shift in thinking by developers,” the team warned. “Legitimate packages may… be compromised and traffic malicious code into legitimate development pipelines, as the recent Shai- hulud npm malware outbreak showed.”

Image credit: Mamun_Sheikh / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleResearchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Next Article How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
Team-CWD
  • Website

Related Posts

News

Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns

February 26, 2026
News

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

February 26, 2026
News

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Is it time for internet services to adopt identity verification?

January 14, 2026

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.