Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious npm Packages Exploit Discord and Crypto Wallets

Malicious npm Packages Exploit Discord and Crypto Wallets

Posted on March 14, 2026 By CWS

Security researchers from JFrog have identified a complex supply chain attack targeting the npm ecosystem. Discovered on March 12, 2026, this attack involved threat actors using malicious npm packages disguised as a legitimate Roblox script executor to distribute information-stealing malware.

Details of the Malicious Campaign

Named the Cipher stealer, this campaign involved two harmful packages: bluelite-bot-manager and test-logsmodule-v-zisko. These packages deployed a Windows executable designed to extract sensitive data such as Discord credentials, browser information, and files from cryptocurrency wallets.

The packages executed a pre-install script to silently download a Windows binary named solara 1.0.0.exe or solara 1.0.1.exe from a Dropbox-hosted URL. This process required no user interaction, making it particularly insidious.

Discord and Browser Targeting

Cipher’s primary focus was on Discord, where it stole session tokens from LevelDB databases in all installed Discord clients and Chromium-based browsers. This information was then verified against Discord’s API to ensure validity.

For users of BetterDiscord, the malware altered the core index.js file to bypass webhook protections, facilitating the transmission of stolen data to the attacker. Additionally, a secondary payload from GitHub was injected into Discord’s desktop client, capturing sensitive user information during the re-login process.

Impact on Browsers and Crypto Wallets

The malware operated on two fronts to steal browser credentials. Using Windows DPAPI libraries, it extracted encryption keys and passwords from several major browsers. Concurrently, a Python script covered additional browsers, obtaining cookies, credit card details, and more.

Furthermore, the malware searched for directories associated with various cryptocurrency wallets, copying and attempting to decrypt their contents. Stolen data was then archived and uploaded to a command-and-control server, with a report sent to the attacker’s Discord webhook.

Although the malicious npm packages have been removed and the Dropbox links deactivated, the GitHub repository hosting the injection script was still active at the time of discovery. Users are advised to uninstall the packages, reinstall Discord, update passwords, and secure their cryptocurrency wallets.

Cyber Security News Tags:browser data theft, crypto security, crypto wallet protection, Cybersecurity, digital security, Discord vulnerability, information-stealing malware, JFrog researchers, malware attack, malware prevention, Node.js malware, npm security, python script malware, supply chain attack, supply chain security

Post navigation

Previous Post: GlassWorm Campaign Expands via Malicious VSX Extensions
Next Post: HPE AOS-CX Flaw Allows Admin Password Resets

Related Posts

Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Cyber Security News
1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files 1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files Cyber Security News
Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years Cyber Security News
Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Cyber Security News
Critical FortiClient EMS Vulnerabilities Expose 2,000 Servers Critical FortiClient EMS Vulnerabilities Expose 2,000 Servers Cyber Security News
Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Silver Fox Threat Group Launches New Malware Campaign
  • Security Concerns Emerge for Electric Bikes and Scooters
  • Checkmarx Data Leak on Dark Web After Security Breach
  • Robinhood Account Flaw Leads to Phishing Email Surge
  • Critical GitHub Flaw Allows RCE via Single Git Push

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Silver Fox Threat Group Launches New Malware Campaign
  • Security Concerns Emerge for Electric Bikes and Scooters
  • Checkmarx Data Leak on Dark Web After Security Breach
  • Robinhood Account Flaw Leads to Phishing Email Surge
  • Critical GitHub Flaw Allows RCE via Single Git Push

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark