Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Node.js-Powered LTX Stealer Targets User Credentials

Node.js-Powered LTX Stealer Targets User Credentials

Posted on February 9, 2026 By CWS

A new cyber threat, known as LTX Stealer, has emerged, leveraging a Node.js-based framework to target Windows systems. This malware is adept at capturing sensitive user information such as login details, browser cookies, and cryptocurrency wallet data.

Unique Node.js Architecture

First identified in early 2026, LTX Stealer is notable for its use of a full Node.js runtime within its payload. This allows it to execute complex JavaScript code directly on an infected machine without needing any additional installations. The attack process begins with a seemingly innocuous Windows installer file called “Negro.exe”, built using the widely-used Inno Setup framework.

This installer disguises the malware, enabling it to evade standard security scans. Once executed, it drops a substantial payload of about 271 MB, a size chosen to bypass antivirus software that might skip scanning large files to preserve system performance.

Targeting Browsers and Cryptocurrency

Upon infiltration, the LTX Stealer primarily targets Chromium-based browsers such as Google Chrome and Microsoft Edge. It extracts encryption keys from “Local State” files to unlock stored passwords and session cookies. Additionally, it scans for cryptocurrency wallets and captures activity screenshots.

The extracted data is then compressed for exfiltration to a command-and-control server. The attackers utilize cloud services like Supabase for authentication and employ Cloudflare to obscure their server’s true location, enhancing the malware’s resilience against takedowns.

Advanced Obfuscation Techniques

A hallmark of LTX Stealer is its sophisticated obfuscation methods designed to prevent reverse engineering. The main payload, updater.exe, is a packaged Node.js application created with the pkg tool, which bundles the JavaScript logic, dependencies, and runtime into a single binary.

To further conceal their code, the developers convert the JavaScript source into bytecode using Bytenode, making the code nearly impossible to decompile. This strategy raises the complexity of analyzing the malware, requiring specialized knowledge of Node.js internals.

Defensive Measures

Organizations can take several steps to guard against LTX Stealer. Blocking known malicious domains and IP addresses associated with the malware’s control panel is crucial. Monitoring the creation of hidden directories mimicking legitimate software vendors can help in early detection.

Security teams should also flag large, unsigned executables exhibiting Node.js application behaviors and monitor processes accessing browser “Local State” files, as these are indicative of credential-stealing activities.

For ongoing updates, follow us on Google News, LinkedIn, and X, and consider setting CSN as a preferred source on Google.

Cyber Security News Tags:antivirus evasion, credential security, credential theft, cyber threat, Cybersecurity, IT security, LTX Stealer, malware analysis, Node.js malware, Windows threat

Post navigation

Previous Post: Hackers Target Ivanti EPMM Devices with Hidden Backdoors
Next Post: European Commission Thwarts Cyber-Attack on Mobile Data

Related Posts

PoC Published For Fortinet 0-Day Vulnerability That Being Exploited in the Wild PoC Published For Fortinet 0-Day Vulnerability That Being Exploited in the Wild Cyber Security News
Comcast to Pay a .5 Million Fine to Settle an FCC Investigation Linked to Vendor Data Breach Comcast to Pay a $1.5 Million Fine to Settle an FCC Investigation Linked to Vendor Data Breach Cyber Security News
PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation Cyber Security News
Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code Cyber Security News
CoinDCX Hacked – .2 million Wiped off From the Platform CoinDCX Hacked – $44.2 million Wiped off From the Platform Cyber Security News
New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark