Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum, a popular Ethereum .NET integration platform, to steal victims' cryptocurrency wallet keys. The package, Netherеum.All, has been found to harbor functionality to decode a command-and-control (C2) endpoint and exfiltrate mnemonic phrases, private keys, and
AI Analysis
Technical Summary
Researchers uncovered a sophisticated supply chain attack targeting the NuGet package manager ecosystem by publishing a malicious typosquatted package named Netherеum.All, which impersonated the legitimate Nethereum Ethereum .NET integration library. The attacker replaced the last letter 'e' in 'Nethereum' with the visually similar Cyrillic character 'е' (U+0435), exploiting homoglyph substitution to deceive developers into downloading the malicious package. Uploaded by a user named 'nethereumgroup' on October 16, 2025, the package was removed four days later after violating NuGet’s Terms of Use. The malicious package contained a function named EIP70221TransactionService.Shuffle that decoded an XOR-encoded string to reveal a command-and-control (C2) server endpoint (solananetworkinstance[.]info/api/gads). This function exfiltrated sensitive wallet data including mnemonic phrases, private keys, and keystore information to the attacker’s server. To increase credibility, the attacker artificially inflated download counts to 11.7 million by scripting automated downloads from cloud hosts using IP rotation and user-agent spoofing, thereby boosting search rankings and misleading developers. This attack leverages NuGet’s permissive naming policies that allow Unicode homoglyphs, unlike other package repositories that restrict names to ASCII characters. The threat actor had previously uploaded a similar malicious package named NethereumNet earlier in October 2025. This attack highlights the risks of supply chain compromises in open-source ecosystems, especially for blockchain-related software where stolen keys can lead to irreversible financial loss. No authentication or user interaction beyond package installation is required, making this a potent vector for crypto theft. The attack underscores the need for rigorous package vetting, publisher verification, and monitoring of anomalous network traffic to detect exfiltration attempts.
Potential Impact
This threat poses a significant risk to European organizations involved in blockchain development, cryptocurrency wallet management, and financial services leveraging Ethereum .NET integrations. The exfiltration of mnemonic phrases and private keys can lead to irreversible theft of cryptocurrency assets, resulting in direct financial losses and reputational damage. Organizations relying on Nethereum or similar libraries may inadvertently introduce backdoors into their software supply chain, compromising the integrity and confidentiality of their crypto wallets. The artificial inflation of download counts can mislead developers into trusting malicious packages, increasing the attack surface. Given the stealthy nature of the attack—requiring no user interaction beyond package installation—large-scale compromise is possible if supply chain hygiene is not enforced. The attack also undermines trust in open-source ecosystems and may disrupt blockchain-related projects and services across Europe. Regulatory compliance risks may arise if organizations fail to protect sensitive cryptographic keys, especially under GDPR and financial regulations. The attack could also impact software vendors and developers who distribute or depend on Nethereum packages, potentially cascading into broader ecosystem compromises.
Mitigation Recommendations
European organizations should implement strict supply chain security controls including: 1) Enforce package verification by validating publisher identities and scrutinizing package names for homoglyphs or typosquatting attempts before installation. 2) Use cryptographic signing and verification of NuGet packages to ensure authenticity and integrity. 3) Monitor download statistics and investigate sudden surges or anomalies that may indicate manipulation. 4) Employ static and dynamic analysis tools to scan third-party packages for suspicious code, especially those handling cryptographic keys. 5) Restrict package sources to trusted repositories and consider using internal mirrors or proxies that vet packages. 6) Implement network monitoring and anomaly detection to identify unusual outbound traffic patterns indicative of data exfiltration. 7) Educate developers about homoglyph attacks and the risks of typosquatting in package managers. 8) Regularly audit cryptographic key usage and rotate keys if compromise is suspected. 9) Advocate for NuGet to adopt stricter naming policies restricting Unicode homoglyphs to prevent similar attacks. 10) Integrate supply chain risk management into DevSecOps pipelines to detect and block malicious dependencies early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland, Estonia
Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
Description
Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum, a popular Ethereum .NET integration platform, to steal victims' cryptocurrency wallet keys. The package, Netherеum.All, has been found to harbor functionality to decode a command-and-control (C2) endpoint and exfiltrate mnemonic phrases, private keys, and
AI-Powered Analysis
Technical Analysis
Researchers uncovered a sophisticated supply chain attack targeting the NuGet package manager ecosystem by publishing a malicious typosquatted package named Netherеum.All, which impersonated the legitimate Nethereum Ethereum .NET integration library. The attacker replaced the last letter 'e' in 'Nethereum' with the visually similar Cyrillic character 'е' (U+0435), exploiting homoglyph substitution to deceive developers into downloading the malicious package. Uploaded by a user named 'nethereumgroup' on October 16, 2025, the package was removed four days later after violating NuGet’s Terms of Use. The malicious package contained a function named EIP70221TransactionService.Shuffle that decoded an XOR-encoded string to reveal a command-and-control (C2) server endpoint (solananetworkinstance[.]info/api/gads). This function exfiltrated sensitive wallet data including mnemonic phrases, private keys, and keystore information to the attacker’s server. To increase credibility, the attacker artificially inflated download counts to 11.7 million by scripting automated downloads from cloud hosts using IP rotation and user-agent spoofing, thereby boosting search rankings and misleading developers. This attack leverages NuGet’s permissive naming policies that allow Unicode homoglyphs, unlike other package repositories that restrict names to ASCII characters. The threat actor had previously uploaded a similar malicious package named NethereumNet earlier in October 2025. This attack highlights the risks of supply chain compromises in open-source ecosystems, especially for blockchain-related software where stolen keys can lead to irreversible financial loss. No authentication or user interaction beyond package installation is required, making this a potent vector for crypto theft. The attack underscores the need for rigorous package vetting, publisher verification, and monitoring of anomalous network traffic to detect exfiltration attempts.
Potential Impact
This threat poses a significant risk to European organizations involved in blockchain development, cryptocurrency wallet management, and financial services leveraging Ethereum .NET integrations. The exfiltration of mnemonic phrases and private keys can lead to irreversible theft of cryptocurrency assets, resulting in direct financial losses and reputational damage. Organizations relying on Nethereum or similar libraries may inadvertently introduce backdoors into their software supply chain, compromising the integrity and confidentiality of their crypto wallets. The artificial inflation of download counts can mislead developers into trusting malicious packages, increasing the attack surface. Given the stealthy nature of the attack—requiring no user interaction beyond package installation—large-scale compromise is possible if supply chain hygiene is not enforced. The attack also undermines trust in open-source ecosystems and may disrupt blockchain-related projects and services across Europe. Regulatory compliance risks may arise if organizations fail to protect sensitive cryptographic keys, especially under GDPR and financial regulations. The attack could also impact software vendors and developers who distribute or depend on Nethereum packages, potentially cascading into broader ecosystem compromises.
Mitigation Recommendations
European organizations should implement strict supply chain security controls including: 1) Enforce package verification by validating publisher identities and scrutinizing package names for homoglyphs or typosquatting attempts before installation. 2) Use cryptographic signing and verification of NuGet packages to ensure authenticity and integrity. 3) Monitor download statistics and investigate sudden surges or anomalies that may indicate manipulation. 4) Employ static and dynamic analysis tools to scan third-party packages for suspicious code, especially those handling cryptographic keys. 5) Restrict package sources to trusted repositories and consider using internal mirrors or proxies that vet packages. 6) Implement network monitoring and anomaly detection to identify unusual outbound traffic patterns indicative of data exfiltration. 7) Educate developers about homoglyph attacks and the risks of typosquatting in package managers. 8) Regularly audit cryptographic key usage and rotate keys if compromise is suspected. 9) Advocate for NuGet to adopt stricter naming policies restricting Unicode homoglyphs to prevent similar attacks. 10) Integrate supply chain risk management into DevSecOps pipelines to detect and block malicious dependencies early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/fake-nethereum-nuget-package-used.html","fetched":true,"fetchedAt":"2025-10-23T01:21:32.956Z","wordCount":1023}
Threat ID: 68f9831e93bcde9f320bfbe2
Added to database: 10/23/2025, 1:21:34 AM
Last enriched: 10/23/2025, 1:22:55 AM
Last updated: 12/6/2025, 7:43:42 PM
Views: 205
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14139: Buffer Overflow in UTT 进取 520W
MediumCVE-2025-13748: CWE-639 Authorization Bypass Through User-Controlled Key in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
MediumCVE-2025-13907: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tunilame CSS3 Buttons
MediumCVE-2025-13899: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pntrinh TR Timthumb
MediumCVE-2025-13898: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sozan45 Ultra Skype Button
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.