Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys

A sophisticated supply chain attack has emerged targeting cryptocurrency developers through the NuGet package ecosystem.Cybersecurity researchers have uncovered malicious packages impersonating Nethereum, a widely trusted .NET library for Ethereum blockchain interactions with tens of millions of downloads.The counterfeit packages, identified as Netherеum.All and NethereumNet, employ advanced [obfuscation](https://cybersecuritynews.com/malware-obfuscation/) techniques to exfiltrate sensitive wallet credentials including private keys, mnemonics, keystore JSON files, and signed transaction data.The attack leverages a homoglyph typosquatting technique, replacing the Latin letter ‘e’ with a visually identical Cyrillic character (U+0435) in the package name Netherеum.All.This subtle Unicode substitution makes the fraudulent package nearly indistinguishable from the legitimate Nethereum library during casual inspection.The malicious package was first published on October 16, 2025, and remained active until NuGet removed it on October 20, 2025, after receiving security reports.Socket.dev analysts [identified](https://socket.dev/blog/malicious-nuget-packages-typosquat-nethereum-to-exfiltrate-wallet-keys?utm_medium=feed) the threat during routine scanning operations, uncovering a coordinated campaign by a single threat actor operating under two NuGet publisher aliases: nethereumgroup and NethereumCsharp. ![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIhWTSbUy5ahSwUyFjM7lc7rO9ApS5O3lKNOph9daF_Pr0roqjd4taR9fagiApY0quwE5eGUqOZ1fUws9lmuajLZHFgws3ssSsO5agapbv5DeO_983Y5s2iL-RqbMhVI9iemKFBriE-mObfewtzcXfDxPkQi2XK1sKxSb-tLmlme23jRUths_JgZnMaHM/s16000/NuGet%20search%20results%20show%20the%20malicious%20Nether%D0%B5um%20(Source%20-%20Socket.dev).webp) NuGet search results show the malicious Netherеum (Source — Socket.dev)Both malicious packages incorporated identical exfiltration mechanisms and utilized artificial download inflation tactics, with Netherеum.All displaying an implausible 11.6 million downloads within days of publication.This manufactured popularity metric created a false sense of legitimacy, potentially deceiving developers during package selection.The packages appeared functional, referencing genuine Nethereum dependencies such as Nethereum.Hex, Nethereum.Signer, and Nethereum.Util, ensuring normal compilation and expected Ethereum operations.However, the malicious code remained dormant until specific wallet-related functions were invoked, activating the concealed [exfiltration](https://cybersecuritynews.com/cl0p-ransomware-data-exfiltration-vulnerable/) mechanism.**Technical Mechanism and Payload Analysis**——————————————–The malware’s core functionality resides within EIP70221TransactionService.Shuffle, which implements a position-based XOR decoding routine to reveal the command-and-control endpoint at runtime.The obfuscated seed string undergoes XOR operations with a 44-byte mask, decoding to https://solananetworkinstance-[.-]info/api/gads.When wallet operations are executed, the malicious method captures sensitive data and transmits it via HTTPS POST request with a form field named ‘message’, effectively stealing credentials while maintaining the appearance of legitimate blockchain interactions.The attack demonstrates sophisticated supply chain compromise tactics, combining Unicode homoglyphs, download manipulation, and runtime obfuscation to bypass security controls and target [cryptocurrency assets](https://cybersecuritynews.com/cybersecurity-mistakes-in-cryptocurrency-trading/).**Follow us on [Google News](https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&gl=IN&ceid=IN:en), [LinkedIn](https://www.linkedin.com/company/cybersecurity-news/), and [X](https://x.com/cyber_press_org) to Get More Instant Updates** , **Set CSN as a Preferred Source in [Google](https://www.google.com/preferences/source?q=cybersecuritynews.com).**The post [Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys](https://cybersecuritynews.com/malicious-nuget-packages/) appeared first on [Cyber Security News](https://cybersecuritynews.com).

Related Tags:
NAICS: 52 – Finance And Insurance

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 33 – Manufacturing – Metal

Electronics And Other

NAICS: 523 – Securities

Commodity Contracts

Other Financial Investments And Related Activities

NAICS: 51 – Information

Blog: Cybersecurity News

Stage Capabilities: SEO Poisoning

Stage Capabilities

Deobfuscate/Decode Files or Information

Associated Indicators:
solananetworkinstance.info