Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

Posted on February 12, 2026 By CWS

A recent security threat has surfaced in the software community, originating from a malicious NPM package called ‘duer-js’. This package, posing as a legitimate tool, has put numerous Windows users and developers at risk by distributing harmful malware.

The ‘duer-js’ package, uploaded by the user ‘luizaearlyx’, was crafted to mimic a typical console visibility application. Despite only having 528 downloads, experts caution that its advanced techniques significantly endanger anyone who has utilized it.

The Threat Behind ‘Bada Stealer’

What sets this malware apart is its sophisticated, multi-layered attack process. Once installed, ‘Bada Stealer’ not only extracts data but also deploys another malicious payload specifically targeting Discord users.

This secondary attack infiltrates the Discord application, embedding itself within the startup process to clandestinely capture sensitive data whenever the app is used. This includes payment information and authentication tokens, even bypassing two-factor authentication measures.

In-Depth Analysis by Security Researchers

Security analysts from JFrog have delved into the intricate workings of ‘duer-js’, revealing its complex obfuscation methods. They found that simply uninstalling the package does not fully eradicate the threat, as it employs persistence tactics to withstand basic removal efforts.

The malware’s operational strategy involves terminating active browser and Telegram processes to access otherwise secured files. It then systematically scans for valuable data across various applications, targeting Discord tokens, Nitro subscriptions, billing data, and more.

Data Exfiltration Techniques

‘Bada Stealer’ meticulously extracts passwords from major browsers such as Chrome, Edge, and Brave by decrypting them through the Windows Data Protection API. It also collects cookies and autofill information, including credit card details, before encryption.

Particularly concerning is its focus on cryptocurrency wallets, seeking out Exodus and browser-extension wallets like MetaMask. Even Steam users are at risk, as the malware compresses and transfers Steam configuration files.

Data is exfiltrated using a Discord webhook and Gofile cloud storage, ensuring attackers receive the stolen information even if one method fails. The malware generates text files with sensitive data, which are then uploaded to these channels.

Steps for Mitigation and Protection

For those who have installed the ‘duer-js’ package, immediate action is crucial. Begin by thoroughly closing Discord and uninstalling it via Windows Settings or Control Panel. Navigate to ‘%LOCALAPPDATA%’ and delete all Discord-related folders to remove malicious code.

Reinstall Discord from its official site, remove ‘node.exe’ files from the Windows Startup folder, and change all browser-stored passwords. Revoke Discord tokens, enable two-factor authentication, and scrutinize Discord payment methods for unauthorized changes. Verify cryptocurrency wallets and Steam accounts for unusual activity to ensure complete eradication of the malware and protect your systems from future threats.

Cyber Security News Tags:Bada Stealer, Cybersecurity, data protection, Discord, duer-js, Hacking, Malware, NPM, Software Security, Windows

Post navigation

Previous Post: Critical Flaw in WordPress Plugin Risks Site Security
Next Post: Managing Technical Debt in AI-Driven Software Development

Related Posts

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction Cyber Security News
Hackers Exploit Intel Utility for Covert Malware Deployment Hackers Exploit Intel Utility for Covert Malware Deployment Cyber Security News
Building a Cyber-Resilient Organization CISOs Roadmap Building a Cyber-Resilient Organization CISOs Roadmap Cyber Security News
ShadowSyndicate Adopts Server Transition in Cyber Attacks ShadowSyndicate Adopts Server Transition in Cyber Attacks Cyber Security News
Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools Cyber Security News
Bridgestone Confirms Cyberattack Impacts Manufacturing Facilities Bridgestone Confirms Cyberattack Impacts Manufacturing Facilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark