Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Expert Recommendation: Get ready for PQC today February 26, 2026 Encryption/Data Protection Overview: Steal today, break in 10 years Digital evolution is unstoppable, and although the pace varies, sooner or later things tend to stick. Of course, that also applies to adversaries. The rise of ransomware and cyber extortion has created funding for a complex and highly specialized criminal ecosystem. The cloud era has made nearly limitless storage capacity commonly available. Therefore, there is literally nothing stopping criminals from stealing and trading large amounts of data, encrypted or not. The patient’s adversary is "Harvest now, decrypt later" (HNDL) Strategy. They secretly accumulate encrypted data with the intention of later decrypting it using quantum computers. Data that requires long-term security, such as trade secrets or sensitive designs, will inevitably have a longer lifetime than current encryption, making them more vulnerable. Therefore, it is important for organizations to begin planning their transition to PQC.

£76m invested in national computing to solve key industry challenges

Microsoft warns developers about fake Next.js job repository distributing in-memory malware

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious StripeApi NuGet package imitated official library and stole API tokens
Identity

Malicious StripeApi NuGet package imitated official library and stole API tokens

userBy userFebruary 26, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 26, 2026Malware/Software Security

Cybersecurity researchers have revealed details of a new malicious package discovered in the NuGet Gallery that targets the financial sector by impersonating a library from financial services company Stripe.

The package, codenamed StripeApi.Net, attempts to impersonate Stripe.net, the official Stripe library that has been downloaded over 75 million times. This package was uploaded on February 16, 2026 by a user named StripePayments. This package is currently unavailable.

“NuGet pages for malicious packages are set up to look as similar to official Stripe.net packages as possible,” said Petar Kirhmajer of ReversingLabs. “It uses the same icon as the official package and includes an almost identical Readme, but only replaces references to ‘Stripe.net’ with ‘Stripe-net.'”

The attackers behind this campaign are said to have artificially inflated the number of downloads to more than 180,000 to further increase the credibility of the typosquatted packages. But in an interesting twist, the downloads were split into 506 versions, with each version averaging around 300 downloads.

This package replicates some of the functionality of the legitimate Stripe package, but also modifies certain key methods for collecting and transmitting sensitive data, including users’ Stripe API tokens, to threat actors. The rest of the codebase is fully functional and is unlikely to arouse suspicion from unsuspecting developers who may have downloaded it inadvertently.

ReversingLabs said it discovered and reported the package “relatively soon” after it was first released, so it was removed before it could do any serious damage.

The software supply chain security firm also noted that this activity marks a shift from previous campaigns that leveraged fake NuGet packages to target the cryptocurrency ecosystem and facilitate the theft of wallet keys.

“Even if a developer accidentally downloads and integrates a typeposquated library like StripeAPI.net, the application will compile successfully and function as intended,” Kirhmajer said. “Payments are processed successfully and nothing appears to be broken from the developer’s perspective. However, in the background sensitive data is secretly copied and exposed by a malicious attacker.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStrengthening the human-animal bond to improve health for all
Next Article Establish a long-term policy vision that supports net-zero nuclear power generation
user
  • Website

Related Posts

Expert Recommendation: Get ready for PQC today February 26, 2026 Encryption/Data Protection Overview: Steal today, break in 10 years Digital evolution is unstoppable, and although the pace varies, sooner or later things tend to stick. Of course, that also applies to adversaries. The rise of ransomware and cyber extortion has created funding for a complex and highly specialized criminal ecosystem. The cloud era has made nearly limitless storage capacity commonly available. Therefore, there is literally nothing stopping criminals from stealing and trading large amounts of data, encrypted or not. The patient’s adversary is "Harvest now, decrypt later" (HNDL) Strategy. They secretly accumulate encrypted data with the intention of later decrypting it using quantum computers. Data that requires long-term security, such as trade secrets or sensitive designs, will inevitably have a longer lifetime than current encryption, making them more vulnerable. Therefore, it is important for organizations to begin planning their transition to PQC.

February 26, 2026

Microsoft warns developers about fake Next.js job repository distributing in-memory malware

February 26, 2026

Cisco SD-WAN zero-day CVE-2026-20127 has been exploited for administrator access since 2023

February 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Expert Recommendation: Get ready for PQC today February 26, 2026 Encryption/Data Protection Overview: Steal today, break in 10 years Digital evolution is unstoppable, and although the pace varies, sooner or later things tend to stick. Of course, that also applies to adversaries. The rise of ransomware and cyber extortion has created funding for a complex and highly specialized criminal ecosystem. The cloud era has made nearly limitless storage capacity commonly available. Therefore, there is literally nothing stopping criminals from stealing and trading large amounts of data, encrypted or not. The patient’s adversary is "Harvest now, decrypt later" (HNDL) Strategy. They secretly accumulate encrypted data with the intention of later decrypting it using quantum computers. Data that requires long-term security, such as trade secrets or sensitive designs, will inevitably have a longer lifetime than current encryption, making them more vulnerable. Therefore, it is important for organizations to begin planning their transition to PQC.

£76m invested in national computing to solve key industry challenges

Microsoft warns developers about fake Next.js job repository distributing in-memory malware

Establish a long-term policy vision that supports net-zero nuclear power generation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.