Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages

Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages

Posted on January 8, 2026January 8, 2026 By CWS

Jan 08, 2026Ravie LakshmananMalware / Cloud Safety
Cybersecurity researchers have found three malicious npm packages which can be designed to ship a beforehand undocumented malware referred to as NodeCordRAT.
The names of the packages, all of which have been taken down as of November 2025, are listed beneath. They have been uploaded by a person named “wenmoonx.”

“The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script throughout set up, which installs bip40, the package deal that comprises the malicious payload,” Zscaler ThreatLabz researchers Satyam Singh and Lakhan Parashar mentioned. “This remaining payload, named NodeCordRAT by ThreatLabz, is a distant entry trojan (RAT) with data-stealing capabilities.”
NodeCordRAT will get its title from using npm as a propagation vector and Discord servers for command-and-control (C2) communications. The malware is supplied to steal Google Chrome credentials, API tokens, and seed phrases from cryptocurrency wallets like MetaMask.

In accordance with the cybersecurity firm, the risk actor behind the marketing campaign is assessed to have named the packages after actual repositories discovered inside the legit bitcoinjs mission, equivalent to bitcoinjs-lib, bip32, bip38, and bip38.
Each “bitcoin-main-lib” and “bitcoin-lib-js” embrace a “package deal.json” file that options “postinstall.cjs” as a postinstall script, resulting in the execution of “bip40” that comprises the NodeCordRAT payload.

The malware, apart from fingerprinting the contaminated host to generate a singular identifier throughout Home windows, Linux, and macOS programs, leverages a hard-coded Discord server to open a covert communication channel to obtain directions and execute them –

!run, to execute arbitrary shell instructions utilizing Node.js’ exec operate
!screenshot, to take a full desktop screenshot and exfiltrate the PNG file to the Discord channel
!sendfile, to add a specified file to the Discord channel

“This information is exfiltrated utilizing Discord’s API with a hardcoded token and despatched to a non-public channel,” Zscaler mentioned. “The stolen recordsdata are uploaded as message attachments by way of Discord’s REST endpoint /channels/{id}/messages.”

The Hacker News Tags:BitcoinThemed, Hidden, NodeCordRAT, NPM, Packages, Researchers, Uncover

Post navigation

Previous Post: Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
Next Post: Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Related Posts

Agentic AI: Emerging Security Challenges Explained Agentic AI: Emerging Security Challenges Explained The Hacker News
Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties The Hacker News
Top 10 Best Practices for Effective Data Protection Top 10 Best Practices for Effective Data Protection The Hacker News
Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks The Hacker News
Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News
AI Enhances Security Testing in Dynamic Environments AI Enhances Security Testing in Dynamic Environments The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark