Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

Posted on February 12, 2026 By CWS

A recent security threat has surfaced in the software community, originating from a malicious NPM package called ‘duer-js’. This package, posing as a legitimate tool, has put numerous Windows users and developers at risk by distributing harmful malware.

The ‘duer-js’ package, uploaded by the user ‘luizaearlyx’, was crafted to mimic a typical console visibility application. Despite only having 528 downloads, experts caution that its advanced techniques significantly endanger anyone who has utilized it.

The Threat Behind ‘Bada Stealer’

What sets this malware apart is its sophisticated, multi-layered attack process. Once installed, ‘Bada Stealer’ not only extracts data but also deploys another malicious payload specifically targeting Discord users.

This secondary attack infiltrates the Discord application, embedding itself within the startup process to clandestinely capture sensitive data whenever the app is used. This includes payment information and authentication tokens, even bypassing two-factor authentication measures.

In-Depth Analysis by Security Researchers

Security analysts from JFrog have delved into the intricate workings of ‘duer-js’, revealing its complex obfuscation methods. They found that simply uninstalling the package does not fully eradicate the threat, as it employs persistence tactics to withstand basic removal efforts.

The malware’s operational strategy involves terminating active browser and Telegram processes to access otherwise secured files. It then systematically scans for valuable data across various applications, targeting Discord tokens, Nitro subscriptions, billing data, and more.

Data Exfiltration Techniques

‘Bada Stealer’ meticulously extracts passwords from major browsers such as Chrome, Edge, and Brave by decrypting them through the Windows Data Protection API. It also collects cookies and autofill information, including credit card details, before encryption.

Particularly concerning is its focus on cryptocurrency wallets, seeking out Exodus and browser-extension wallets like MetaMask. Even Steam users are at risk, as the malware compresses and transfers Steam configuration files.

Data is exfiltrated using a Discord webhook and Gofile cloud storage, ensuring attackers receive the stolen information even if one method fails. The malware generates text files with sensitive data, which are then uploaded to these channels.

Steps for Mitigation and Protection

For those who have installed the ‘duer-js’ package, immediate action is crucial. Begin by thoroughly closing Discord and uninstalling it via Windows Settings or Control Panel. Navigate to ‘%LOCALAPPDATA%’ and delete all Discord-related folders to remove malicious code.

Reinstall Discord from its official site, remove ‘node.exe’ files from the Windows Startup folder, and change all browser-stored passwords. Revoke Discord tokens, enable two-factor authentication, and scrutinize Discord payment methods for unauthorized changes. Verify cryptocurrency wallets and Steam accounts for unusual activity to ensure complete eradication of the malware and protect your systems from future threats.

Cyber Security News Tags:Bada Stealer, Cybersecurity, data protection, Discord, duer-js, Hacking, Malware, NPM, Software Security, Windows

Post navigation

Previous Post: Critical Flaw in WordPress Plugin Risks Site Security
Next Post: Managing Technical Debt in AI-Driven Software Development

Related Posts

Tor Adopts Galois Onion Encryption to Strengthen Defense Against Online Attacks Tor Adopts Galois Onion Encryption to Strengthen Defense Against Online Attacks Cyber Security News
MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets Cyber Security News
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope Cyber Security News
Critical Apache Struts 2 Vulnerability Allow Attackers to Steal Sensitive Data Critical Apache Struts 2 Vulnerability Allow Attackers to Steal Sensitive Data Cyber Security News
North Korean Chollima Actors Added BeaverTail and OtterCookie to Its Arsenal North Korean Chollima Actors Added BeaverTail and OtterCookie to Its Arsenal Cyber Security News
GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices
  • 287 Chrome Extensions Breach Privacy of Millions
  • Managing Technical Debt in AI-Driven Software Development
  • NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices
  • 287 Chrome Extensions Breach Privacy of Millions
  • Managing Technical Debt in AI-Driven Software Development
  • NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News