Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Threat: NWHStealer Uses Bun Loader and Encrypted C2

New Threat: NWHStealer Uses Bun Loader and Encrypted C2

Posted on May 8, 2026 By CWS

NWHStealer’s New Sophisticated Approach

A novel threat in the cybersecurity landscape is gaining international attention. The Windows-based malware, NWHStealer, has re-emerged with a more complex delivery mechanism, integrating the Bun JavaScript runtime into its infection strategy. This adjustment signals the attackers’ commitment to leveraging less familiar technologies to bypass security measures.

Understanding NWHStealer’s Mechanisms

NWHStealer, developed using Rust, is designed to extract sensitive information from Windows systems. It proliferates through Node.js scripts, MSI installers, and deceptive software downloads on reputable sites like GitHub and SourceForge. By masquerading as legitimate software, it deceives users into executing it without suspicion.

Malwarebytes researchers identified this new tactic during regular threat analysis. Gabriele Orini highlighted the use of Bun, a modern JavaScript toolkit, as a strategic choice to evade detection, given its novelty in security operations.

Capabilities and Impact of NWHStealer

Once infiltrated, NWHStealer is adept at gathering system data, capturing browser information, draining cryptocurrency wallets, and targeting platforms like Discord and Steam. It can inject harmful code into browsers, bypass Windows User Account Control, and maintain persistence through scheduled tasks. Additionally, it utilizes Telegram for command-and-control communications to continue operations post-detection.

The campaign’s scale is significant, with attackers continuously creating profiles on legitimate platforms to distribute new baits, challenging moderators’ responses. The combination of data theft, persistence, and self-updating capabilities makes NWHStealer a formidable threat to both individuals and organizations.

Technical Details of the Infection Process

The malware begins its attack with a ZIP archive disguised as benign software. Known examples include files like MOUSE_PI_Trainer_v1.0.zip. Inside, an Installer.exe file contains JavaScript code and the Bun runtime, hidden in its .bun section.

The JavaScript is split into two files. Sysreq.js checks the system’s authenticity by running PowerShell commands to detect virtual environments, avoiding detection during automated security evaluations. Memload.js manages communication with the command-and-control server, encrypting data to hinder analysis and deploying NWHStealer directly in memory.

Defense Strategies Against NWHStealer

Given the widespread nature of NWHStealer, users should adopt preventive measures. Download software only from verified sources, and avoid file-sharing platforms unless the publisher’s identity is confirmed. Check digital signatures before running files to ensure legitimacy.

Inspect downloaded archives carefully for unusual structures or mismatched content. Skepticism towards downloads that seem too advantageous, such as game cheats or software activators, remains a crucial defense against threats like NWHStealer.

Cyber Security News Tags:anti-VM checks, Bun loader, Cybersecurity, data theft, encrypted C2, GitHub, Malware, Node.js, NWHStealer, Rust malware

Post navigation

Previous Post: Braintrust Urges API Key Changes Following Security Breach
Next Post: Quasar Linux RAT Endangers Software Supply Chains

Related Posts

Malicious Prettier Extension on VSCode Marketplace Delivers Anivia Stealer Malware to Exfiltrate Login Credentials Malicious Prettier Extension on VSCode Marketplace Delivers Anivia Stealer Malware to Exfiltrate Login Credentials Cyber Security News
Hackers Use Rogue MCP Server to Inject Malicious Code to Control Over Cursor’s Built-in Browser Hackers Use Rogue MCP Server to Inject Malicious Code to Control Over Cursor’s Built-in Browser Cyber Security News
CISA Warns of Apple macOS, iOS, tvOS, Safari, and watchOS Vulnerability Exploited in Attacks CISA Warns of Apple macOS, iOS, tvOS, Safari, and watchOS Vulnerability Exploited in Attacks Cyber Security News
TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands Cyber Security News
Microsoft Unveils New Tool to Migrate VMware Virtual Machines From vCenter to Hyper-V Microsoft Unveils New Tool to Migrate VMware Virtual Machines From vCenter to Hyper-V Cyber Security News
AI Tools Misused for Stealthy Malware Communication AI Tools Misused for Stealthy Malware Communication Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyberattack Disrupts Canvas Platform as Finals Near
  • Linux PamDOORa Backdoor Exploits PAM to Steal SSH Credentials
  • DarkMoon Launches AI-Driven Penetration Testing Platform
  • Cyberattacks Target Polish Water Facilities in 2025
  • Quasar Linux RAT Endangers Software Supply Chains

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyberattack Disrupts Canvas Platform as Finals Near
  • Linux PamDOORa Backdoor Exploits PAM to Steal SSH Credentials
  • DarkMoon Launches AI-Driven Penetration Testing Platform
  • Cyberattacks Target Polish Water Facilities in 2025
  • Quasar Linux RAT Endangers Software Supply Chains

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark