Ticking Time Bombs: NuGet Packages Set to Explode in 2028, Targeting Databases and Siemens S7 PLCs
NuGet packages have gone from handy helpers to pranksters with a twist. Nine malicious packages, hiding 20-line sabotage codes, are set to strike databases and Siemens PLCs unpredictably between 2027 and 2028. Socket researchers suggest auditing your assets now before your systems play a game of “will it crash?” with you.

Hot Take:
In a plot twist worthy of a James Bond movie, it looks like our favorite villain, “shanhai666,” has released a batch of time bombs disguised as legitimate software packages. With a ticking time bomb set for 2027 and 2028, it’s like they’re saying, “Why hack today what you can procrastinate for a few years?” But don’t worry, at least these cyber troublemakers have given us a heads up — just like a villain who can’t help but reveal their master plan. NuGet developers, it’s time to channel your inner 007 and audit those packages, before your databases and Siemens S7 devices go kaboom in 2028!
Key Points:
– Nine malicious packages were found on NuGet with sabotage payloads set for 2027 and 2028.
– The malware specifically targets .NET applications using major database providers and Siemens S7 PLCs.
– The malicious code uses a probabilistic trigger, with only a 20% chance of activation.
– The packages were published under the developer name “shanhai666” and delisted after almost 9,500 downloads.
– The attack features immediate process termination and delayed write corruption.
