February 25, 2026 Source: The Hacker News 3 min read · 657 words

Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

Шкідливі пакети NuGet вкрали дані ASP.NET; npm пакет розповсюджував малвер

Four Malicious NuGet Packages Just Stole ASP.NET Developer Data—Here's What You Need to Know

Four malicious packages. Real data exfiltration. Active backdoors in production applications.

That's the headline from a discovery reported by The Hacker News that should have every ASP.NET developer checking their dependencies right now. Researchers uncovered a coordinated malware campaign targeting NuGet—the package manager most .NET developers rely on—with packages specifically designed to extract ASP.NET Identity data, including user accounts, roles, and permissions.

But here's what makes this particularly nasty: these weren't just info stealers. The malware actively manipulated authorization rules to create backdoors in victim applications. Someone could install one of these packages thinking they're getting a legitimate utility, and weeks later discover unauthorized access patterns in their security logs.

Breaking It Down

So what actually happened here? According to The Hacker News, security researchers identified four distinct NuGet packages—all crafted to target the .NET ecosystem specifically. Unlike generic malware that casts a wide net, this campaign was surgical. The attackers understood ASP.NET Identity framework architecture, knew where sensitive data lives, and built malware that could extract it efficiently.

The packages weren't hidden in obviously suspicious naming conventions either. That's what makes detection harder.

The exfiltration capability is straightforward but effective: the malware hooks into ASP.NET Identity tables, pulls user credentials and role assignments, and ships that data back to command-and-control servers. The authorization manipulation piece is where it gets creepy. By modifying authorization rules, attackers could grant themselves admin-level access or create ghost accounts that would be difficult to spot during routine audits.

It's like someone giving themselves a keycard to every door in your building while making it look like the doors were always open to them.

The Technical Side

Want to understand how this works? NuGet packages run code during installation and can hook into the build process. An attacker with knowledge of ASP.NET's dependency injection and middleware pipeline could inject malicious code that sits between your application and its database layer.

From there, they can intercept identity lookups, harvest data, and modify authorization checks without touching your application code directly. Your developers never see the malicious code in their source repositories. It's all buried in the package binaries.

The authorization rule manipulation is particularly clever because it doesn't immediately break anything. Your app keeps functioning normally. Access logs might show some unusual patterns, but if you're not specifically looking for privilege escalation attempts or unexpected role assignments, you might miss it for months.

Who's Affected

Any developer or organization that installed these four packages is immediately at risk. If you're running one of them in production, assume your ASP.NET Identity data has been compromised. That means user accounts, password hashes, role assignments, and potentially sensitive claim data.

The scope here depends on download numbers, and The Hacker News didn't specify exact infection counts. But even if dozens of developers grabbed these packages, we're talking about potentially thousands of end users whose data is now in attacker hands.

And frankly, this should have been caught sooner. The NuGet package verification system has room for improvement.

What To Do Now

First: check your project dependencies. Right now. Run `nuget list` or review your .csproj files for anything suspicious or unfamiliar. If you installed any of the malicious packages, remove them immediately and rotate your credentials.

Second: audit your user account database. Look for unexpected accounts, unusual role assignments, or privilege grants you didn't authorize. Check access logs for anomalous authentication patterns.

Third: contact your security team about data breach notification requirements. If customer data was exposed, you may have compliance obligations depending on your jurisdiction.

Finally, when evaluating third-party packages going forward, verify the publisher reputation, check when the package was last updated, and look at the download history. A package with zero downloads but sudden activity? Red flag.

This isn't the first time malware has hidden in package managers, and it won't be the last. Stay vigilant with your dependencies.

Read original article →

// FAQ

Which NuGet packages were malicious in this attack?

The Hacker News reported four malicious NuGet packages, but specific package names weren't detailed in the initial reporting. Check NuGet's security advisories and your package manager logs immediately for any packages you don't explicitly recognize.

How can I check if my ASP.NET application was compromised?

Review your access logs for unauthorized role assignments, unexpected account creations, and privilege escalation attempts. Run a database audit on your ASP.NET Identity tables to spot anomalies in user accounts or role grants you didn't authorize.

What data did these malicious packages steal?

The malware exfiltrated ASP.NET Identity data including user accounts, passwords/hashes, assigned roles, permissions, and claims. They also manipulated authorization rules to create backdoor access.

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →