Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Node.js-Powered LTX Stealer Targets User Credentials

Node.js-Powered LTX Stealer Targets User Credentials

Posted on February 9, 2026 By CWS

A new cyber threat, known as LTX Stealer, has emerged, leveraging a Node.js-based framework to target Windows systems. This malware is adept at capturing sensitive user information such as login details, browser cookies, and cryptocurrency wallet data.

Unique Node.js Architecture

First identified in early 2026, LTX Stealer is notable for its use of a full Node.js runtime within its payload. This allows it to execute complex JavaScript code directly on an infected machine without needing any additional installations. The attack process begins with a seemingly innocuous Windows installer file called “Negro.exe”, built using the widely-used Inno Setup framework.

This installer disguises the malware, enabling it to evade standard security scans. Once executed, it drops a substantial payload of about 271 MB, a size chosen to bypass antivirus software that might skip scanning large files to preserve system performance.

Targeting Browsers and Cryptocurrency

Upon infiltration, the LTX Stealer primarily targets Chromium-based browsers such as Google Chrome and Microsoft Edge. It extracts encryption keys from “Local State” files to unlock stored passwords and session cookies. Additionally, it scans for cryptocurrency wallets and captures activity screenshots.

The extracted data is then compressed for exfiltration to a command-and-control server. The attackers utilize cloud services like Supabase for authentication and employ Cloudflare to obscure their server’s true location, enhancing the malware’s resilience against takedowns.

Advanced Obfuscation Techniques

A hallmark of LTX Stealer is its sophisticated obfuscation methods designed to prevent reverse engineering. The main payload, updater.exe, is a packaged Node.js application created with the pkg tool, which bundles the JavaScript logic, dependencies, and runtime into a single binary.

To further conceal their code, the developers convert the JavaScript source into bytecode using Bytenode, making the code nearly impossible to decompile. This strategy raises the complexity of analyzing the malware, requiring specialized knowledge of Node.js internals.

Defensive Measures

Organizations can take several steps to guard against LTX Stealer. Blocking known malicious domains and IP addresses associated with the malware’s control panel is crucial. Monitoring the creation of hidden directories mimicking legitimate software vendors can help in early detection.

Security teams should also flag large, unsigned executables exhibiting Node.js application behaviors and monitor processes accessing browser “Local State” files, as these are indicative of credential-stealing activities.

For ongoing updates, follow us on Google News, LinkedIn, and X, and consider setting CSN as a preferred source on Google.

Cyber Security News Tags:antivirus evasion, credential security, credential theft, cyber threat, Cybersecurity, IT security, LTX Stealer, malware analysis, Node.js malware, Windows threat

Post navigation

Previous Post: Hackers Target Ivanti EPMM Devices with Hidden Backdoors
Next Post: European Commission Thwarts Cyber-Attack on Mobile Data

Related Posts

Critical PHP Composer Flaw Allows Command Execution Critical PHP Composer Flaw Allows Command Execution Cyber Security News
CamelClone Espionage Targets Governments via File-Sharing CamelClone Espionage Targets Governments via File-Sharing Cyber Security News
Lite XL Text editor Vulnerability Let Attackers Execute Arbitrary Code Lite XL Text editor Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass Cyber Security News
Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process Cyber Security News
Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark