Company
Date Published
Author
Ori Hollander, JFrog Security Research
Word count
1368
Language
English
Hacker News points
None

Summary

The blog post provides an in-depth analysis of "Impala Stealer," a malicious payload used in a sophisticated supply chain attack targeting .NET developers through the NuGet package manager. The attackers employed typosquatting to distribute 13 malicious packages impersonating popular legitimate packages, leveraging the NuGet package structure to execute PowerShell scripts that initiate a two-stage attack. The first stage involves executing a PowerShell script to download and run a Windows executable, while the second stage sees the executable persist as a backdoor, targeting the Exodus Wallet desktop application to access cryptocurrency accounts via code injection. The payload, a .NET application compiled using Ahead of Time (AoT) compilation, ensures persistency through an auto-update mechanism and code injection into popular applications like Discord and Visual Studio Code. The malware's primary function is to exfiltrate sensitive data from the Exodus Wallet to a hardcoded Discord webhook, highlighting the growing threat of supply chain attacks that .NET developers must be vigilant against.