Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens

Published: (February 26, 2026 at 05:09 AM EST)
2 min read

Source: The Hacker News

Overview

Cybersecurity researchers have disclosed a new malicious package discovered on the NuGet Gallery that impersonated a library from financial services firm Stripe in an attempt to target the financial sector.

The package, codenamed StripeApi.Net, masqueraded as the legitimate Stripe.net library, which has over 75 million downloads. It was uploaded by a user named StripePayments on February 16 2026 and has since been removed.

“The NuGet page for the malicious package is set up to resemble the official Stripe.net package as closely as possible,” said ReversingLabs researcher Petar Kirhmajer. “It uses the same icon as the legitimate package and contains a nearly identical readme, only swapping the ‘Stripe.net’ references to read ‘Stripe‑net.’”

Stripe malware screenshot

Typosquatted Package Details

  • Package name: StripeApi.Net (typo‑squatted as Stripe‑net)
  • Uploader: StripePayments
  • Upload date: February 16 2026
  • Status: No longer available on NuGet

The threat actor artificially inflated the download count to more than 180 000. However, the downloads were spread across 506 different versions, with each version recording roughly 300 downloads on average.

ThreatLocker download graph

Malicious Behavior

The package replicates much of the legitimate Stripe library’s functionality, but it modifies critical methods to collect and exfiltrate sensitive data, including the user’s Stripe API token, back to the threat actor. The rest of the code remains functional, allowing applications to compile and run without raising suspicion.

Stripe library code screenshot

Response and Mitigation

ReversingLabs reported discovering and notifying the NuGet maintainers relatively soon after the package’s release, leading to its removal before any serious damage could occur.

The incident marks a shift from prior campaigns that targeted the cryptocurrency ecosystem with bogus NuGet packages (see the earlier reports on fake Nethereum packages and fake WhatsApp API packages on npm).

“Developers who mistakenly download and integrate a typosquatted library like StripeAPI.net will still have their applications compile successfully and function as intended,” Kirhmajer explained. “Payments would process normally and, from the developer’s perspective, nothing would appear broken. In the background, however, sensitive data is being secretly copied and exfiltrated by malicious actors.”

0 views
Back to Blog

Related posts

Read more »