Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Threat: NWHStealer Uses Bun Loader and Encrypted C2

New Threat: NWHStealer Uses Bun Loader and Encrypted C2

Posted on May 8, 2026 By CWS

NWHStealer’s New Sophisticated Approach

A novel threat in the cybersecurity landscape is gaining international attention. The Windows-based malware, NWHStealer, has re-emerged with a more complex delivery mechanism, integrating the Bun JavaScript runtime into its infection strategy. This adjustment signals the attackers’ commitment to leveraging less familiar technologies to bypass security measures.

Understanding NWHStealer’s Mechanisms

NWHStealer, developed using Rust, is designed to extract sensitive information from Windows systems. It proliferates through Node.js scripts, MSI installers, and deceptive software downloads on reputable sites like GitHub and SourceForge. By masquerading as legitimate software, it deceives users into executing it without suspicion.

Malwarebytes researchers identified this new tactic during regular threat analysis. Gabriele Orini highlighted the use of Bun, a modern JavaScript toolkit, as a strategic choice to evade detection, given its novelty in security operations.

Capabilities and Impact of NWHStealer

Once infiltrated, NWHStealer is adept at gathering system data, capturing browser information, draining cryptocurrency wallets, and targeting platforms like Discord and Steam. It can inject harmful code into browsers, bypass Windows User Account Control, and maintain persistence through scheduled tasks. Additionally, it utilizes Telegram for command-and-control communications to continue operations post-detection.

The campaign’s scale is significant, with attackers continuously creating profiles on legitimate platforms to distribute new baits, challenging moderators’ responses. The combination of data theft, persistence, and self-updating capabilities makes NWHStealer a formidable threat to both individuals and organizations.

Technical Details of the Infection Process

The malware begins its attack with a ZIP archive disguised as benign software. Known examples include files like MOUSE_PI_Trainer_v1.0.zip. Inside, an Installer.exe file contains JavaScript code and the Bun runtime, hidden in its .bun section.

The JavaScript is split into two files. Sysreq.js checks the system’s authenticity by running PowerShell commands to detect virtual environments, avoiding detection during automated security evaluations. Memload.js manages communication with the command-and-control server, encrypting data to hinder analysis and deploying NWHStealer directly in memory.

Defense Strategies Against NWHStealer

Given the widespread nature of NWHStealer, users should adopt preventive measures. Download software only from verified sources, and avoid file-sharing platforms unless the publisher’s identity is confirmed. Check digital signatures before running files to ensure legitimacy.

Inspect downloaded archives carefully for unusual structures or mismatched content. Skepticism towards downloads that seem too advantageous, such as game cheats or software activators, remains a crucial defense against threats like NWHStealer.

Cyber Security News Tags:anti-VM checks, Bun loader, Cybersecurity, data theft, encrypted C2, GitHub, Malware, Node.js, NWHStealer, Rust malware

Post navigation

Previous Post: Braintrust Urges API Key Changes Following Security Breach
Next Post: Quasar Linux RAT Endangers Software Supply Chains

Related Posts

Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges Cyber Security News
Critical Apache Commons Text Vulnerability Enables Remote Code Execution Attacks Critical Apache Commons Text Vulnerability Enables Remote Code Execution Attacks Cyber Security News
Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Cyber Security News
New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer Cyber Security News
CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks Cyber Security News
RansomHouse RaaS Service Upgraded with Double Extortion Strategy that Steals and Encrypt Data RansomHouse RaaS Service Upgraded with Double Extortion Strategy that Steals and Encrypt Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyberattacks Target Polish Water Facilities in 2025
  • Quasar Linux RAT Endangers Software Supply Chains
  • New Threat: NWHStealer Uses Bun Loader and Encrypted C2
  • Braintrust Urges API Key Changes Following Security Breach
  • Enterprise Security Gaps: Insights from 25 Million Alerts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyberattacks Target Polish Water Facilities in 2025
  • Quasar Linux RAT Endangers Software Supply Chains
  • New Threat: NWHStealer Uses Bun Loader and Encrypted C2
  • Braintrust Urges API Key Changes Following Security Breach
  • Enterprise Security Gaps: Insights from 25 Million Alerts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark