Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Stealit malware exploits a single executable feature in Node.js via game and VPN installers
Identity

Stealit malware exploits a single executable feature in Node.js via game and VPN installers

userBy userOctober 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 10, 2025Ravi LakshmananRansomware/Data Theft

Stealit malware exploits Node.js single executable functionality

Cybersecurity researchers have revealed details of an active malware campaign called Stealit that leverages Node.js’ Single Executable Application (SEA) feature as a way to distribute its payload.

According to Fortinet FortiGuard Labs, some iterations also employ the open-source Electron framework for malware delivery. The malware is assessed to be propagating through fake installers for games and VPN applications uploaded to file-sharing sites such as Mediafire and Discord.

SEA is a feature that allows you to package and distribute Node.js applications as standalone executables, even on systems that do not have Node.js installed.

“Both approaches are effective for distributing Node.js-based malware because they can run without requiring a pre-installed Node.js runtime or additional dependencies,” security researchers Eduardo Altares and Joie Salvio said in a report shared with The Hacker News.

On its dedicated website, the attackers behind Stealit claim to offer “professional data extraction solutions” through several subscription plans. This includes remote access Trojans (RATs) that support file extraction, webcam control, live screen monitoring, and ransomware deployment targeting both Android and Windows operating systems.

CIS build kit

Windows Stealer prices range from $29.99 for a weekly subscription to $499.99 for a perpetual license. Meanwhile, Android RAT prices range from $99.99 to $1,999.99.

Note that the fake executable contains an installer designed to retrieve and install the main components of the malware obtained from command and control (C2), but before doing so it performs a number of anti-analysis checks to ensure that it is running within a virtual or sandboxed environment.

An important part of this step involves writing a Base64-encoded authentication key (a 12-character alphanumeric key) to the %temp%\cache.json file. This key is used to authenticate with the C2 server and to log into the dashboard for subscribers to monitor and control their victims.

The malware is also designed to configure exclusions in Microsoft Defender Antivirus so that folders containing downloaded components are not flagged. The functions of the three executables are:

save_data.exe. The malware will only be downloaded and executed if it is running with elevated privileges. It is designed to extract information from Chromium-based browsers by dropping a tool named “cache.exe” that is part of the open source project ChromElevator. stats_db.exe is designed to extract information from messengers (Telegram, WhatsApp), cryptocurrency wallets and wallet browser extensions (Atomic and Exodus), and game-related apps (Steam, Minecraft, GrowTopia, and Epic Games Launcher). game_cache.exe is designed to set persistence on the host by creating a Visual Basic script to start the host on system reboot, communicate with the C2 server to stream the victim’s screen in real time, execute arbitrary commands, download/upload files, and change the desktop wallpaper.

“This new Stealit campaign leverages the experimental Node.js Single Executable Application (SEA) feature, which is still in active development, to easily distribute malicious scripts to systems that do not have Node.js installed,” Fortinet said. “The attackers behind this may be looking to exploit the novelty of this feature and rely on the element of surprise, catching security applications and malware analysts off guard.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFormer British Prime Minister Rishi Sunak advises Microsoft and Anthropic
Next Article Spyware maker NSO Group confirms acquisition by US investor
user
  • Website

Related Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Aquawise unveils AI-powered water quality technology at TechCrunch Disrupt 2025

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.