Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Malicious NuGet Package Targets Stripe Developers
Malicious NuGet Package Targets Stripe Developers
Security

Malicious NuGet Package Targets Stripe Developers

February 25, 2026No Comments2 Mins Read

A malicious NuGet package designed to mimic Stripe’s official .NET library has been uncovered by cybersecurity researchers, marking a shift in tactics from earlier cryptocurrency-focused campaigns to the broader financial sector.

The package, named StripeApi.Net, impersonated Stripe.net, the legitimate helper library used to integrate Stripe payments into Microsoft .NET applications.

With more than 74 million downloads, Stripe.net is widely adopted by developers building payment, billing and subscription systems. This made the malicious package particularly dangerous.

Typosquatting Campaign Targets Developers

According to a new advisory by ReversingLabs, rather than attempting to breach Stripe’s official package, the threat actors used typosquatting and published a similarly named package to trick developers into installing it.

The fake listing closely resembled the genuine NuGet page. It used the same icon, near-identical documentation and matching tags.

The publisher name, “StripePayments,” was chosen to appear credible, though the account retained the default NuGet profile image instead of Stripe’s logo.

Researchers said that the malicious package showed more than 180,000 downloads. However, they also noted that figures appear to have been artificially inflated.

Instead of accumulating large download counts across a small number of versions, the threat actors spread roughly 300 downloads each across 506 versions to create the impression of steady use.

Hidden Code Exfiltrated API Keys

A deeper inspection revealed that the package contained largely legitimate Stripe code, but with subtle modifications. Critical methods were altered to capture API tokens when the StripeClient class was initialized.

Read more on attacks targeting Stripe customers: Stripe API Skimming Campaign Unveils New Techniques for Theft 

Once obtained, the stolen API keys and a machine identifier were transmitted to a Supabase database controlled by the attackers. Supabase provides managed PostgreSQL services, making it convenient as data collection infrastructure.

See also  LDO Price Prediction: Targets $0.75-$0.85 by February Amid Oversold Recovery

Despite the inflated download count, ReversingLabs said it is unlikely any developers were compromised. The company reported the package shortly after its publication on February 16, and NuGet administrators removed it shortly after receiving the notification. An examination of the associated Supabase database found no stolen tokens, only a test entry.

ReversingLabs warned that the incident highlights persistent third-party risk in modern software development. 

“The increasing frequency of such campaigns requires a shift in thinking by developers,” the team warned. “Legitimate packages may… be compromised and traffic malicious code into legitimate development pipelines, as the recent Shai- hulud npm malware outbreak showed.”

Image credit: Mamun_Sheikh / Shutterstock.com

Source link

Developers Malicious NuGet Package Stripe Targets

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026
Top Posts

Tokenized Uranium Lending Launches via Metals.io and Morpho Protocol

March 31, 2026

Lightning Labs Rolls Out 'Taproot Assets,' to Make Bitcoin 'Multi-Asset' Network

October 18, 2023

Solana Price Bounces After 30% Crash, Yet Recovery Looks Weak

February 6, 2026

Type above and press Enter to search. Press Esc to cancel.