Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Node.js-Powered LTX Stealer Targets User Credentials

Node.js-Powered LTX Stealer Targets User Credentials

Posted on February 9, 2026 By CWS

A new cyber threat, known as LTX Stealer, has emerged, leveraging a Node.js-based framework to target Windows systems. This malware is adept at capturing sensitive user information such as login details, browser cookies, and cryptocurrency wallet data.

Unique Node.js Architecture

First identified in early 2026, LTX Stealer is notable for its use of a full Node.js runtime within its payload. This allows it to execute complex JavaScript code directly on an infected machine without needing any additional installations. The attack process begins with a seemingly innocuous Windows installer file called “Negro.exe”, built using the widely-used Inno Setup framework.

This installer disguises the malware, enabling it to evade standard security scans. Once executed, it drops a substantial payload of about 271 MB, a size chosen to bypass antivirus software that might skip scanning large files to preserve system performance.

Targeting Browsers and Cryptocurrency

Upon infiltration, the LTX Stealer primarily targets Chromium-based browsers such as Google Chrome and Microsoft Edge. It extracts encryption keys from “Local State” files to unlock stored passwords and session cookies. Additionally, it scans for cryptocurrency wallets and captures activity screenshots.

The extracted data is then compressed for exfiltration to a command-and-control server. The attackers utilize cloud services like Supabase for authentication and employ Cloudflare to obscure their server’s true location, enhancing the malware’s resilience against takedowns.

Advanced Obfuscation Techniques

A hallmark of LTX Stealer is its sophisticated obfuscation methods designed to prevent reverse engineering. The main payload, updater.exe, is a packaged Node.js application created with the pkg tool, which bundles the JavaScript logic, dependencies, and runtime into a single binary.

To further conceal their code, the developers convert the JavaScript source into bytecode using Bytenode, making the code nearly impossible to decompile. This strategy raises the complexity of analyzing the malware, requiring specialized knowledge of Node.js internals.

Defensive Measures

Organizations can take several steps to guard against LTX Stealer. Blocking known malicious domains and IP addresses associated with the malware’s control panel is crucial. Monitoring the creation of hidden directories mimicking legitimate software vendors can help in early detection.

Security teams should also flag large, unsigned executables exhibiting Node.js application behaviors and monitor processes accessing browser “Local State” files, as these are indicative of credential-stealing activities.

For ongoing updates, follow us on Google News, LinkedIn, and X, and consider setting CSN as a preferred source on Google.

Cyber Security News Tags:antivirus evasion, credential security, credential theft, cyber threat, Cybersecurity, IT security, LTX Stealer, malware analysis, Node.js malware, Windows threat

Post navigation

Previous Post: Hackers Target Ivanti EPMM Devices with Hidden Backdoors
Next Post: European Commission Thwarts Cyber-Attack on Mobile Data

Related Posts

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Cyber Security News
TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome Cyber Security News
New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks Cyber Security News
Conducting Risk Assessments That Drive Business Value Conducting Risk Assessments That Drive Business Value Cyber Security News
Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • European Commission Thwarts Cyber-Attack on Mobile Data
  • Node.js-Powered LTX Stealer Targets User Credentials
  • Hackers Target Ivanti EPMM Devices with Hidden Backdoors
  • China-Linked Group Targets Singapore Telecom in Cyber Attack
  • Critical Roundcube Flaw Allows Email Tracking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • European Commission Thwarts Cyber-Attack on Mobile Data
  • Node.js-Powered LTX Stealer Targets User Credentials
  • Hackers Target Ivanti EPMM Devices with Hidden Backdoors
  • China-Linked Group Targets Singapore Telecom in Cyber Attack
  • Critical Roundcube Flaw Allows Email Tracking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark