• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages

You are here: Home / General Cyber Security News / Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages
January 8, 2026

NodeCordRAT Hidden in npm

Cybersecurity researchers have discovered three malicious npm packages that are designed to deliver a previously undocumented malware called NodeCordRAT.

The names of the packages, all of which were taken down as of November 2025, are listed below. They were uploaded by a user named “wenmoonx.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • bitcoin-main-lib (2,300 Downloads)
  • bitcoin-lib-js (193 Downloads)
  • bip40 (970 Downloads)

“The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload,” Zscaler ThreatLabz researchers Satyam Singh and Lakhan Parashar said. “This final payload, named NodeCordRAT by ThreatLabz, is a remote access trojan (RAT) with data-stealing capabilities.”

NodeCordRAT gets its name from the use of npm as a propagation vector and Discord servers for command-and-control (C2) communications. The malware is equipped to steal Google Chrome credentials, API tokens, and seed phrases from cryptocurrency wallets like MetaMask.

Cybersecurity

According to the cybersecurity company, the threat actor behind the campaign is assessed to have named the packages after real repositories found within the legitimate bitcoinjs project, such as bitcoinjs-lib, bip32, bip38, and bip38.

Both “bitcoin-main-lib” and “bitcoin-lib-js” include a “package.json” file that features “postinstall.cjs” as a postinstall script, leading to the execution of “bip40” that contains the NodeCordRAT payload.

The malware, besides fingerprinting the infected host to generate a unique identifier across Windows, Linux, and macOS systems, leverages a hard-coded Discord server to open a covert communication channel to receive instructions and execute them –

  • !run, to execute arbitrary shell commands using Node.js’ exec function
  • !screenshot, to take a full desktop screenshot and exfiltrate the PNG file to the Discord channel
  • !sendfile, to upload a specified file to the Discord channel

“This data is exfiltrated using Discord’s API with a hardcoded token and sent to a private channel,” Zscaler said. “The stolen files are uploaded as message attachments via Discord’s REST endpoint /channels/{id}/messages.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «coolify discloses 11 critical flaws enabling full server compromise on Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages
  • Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
  • OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls
  • CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
  • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
  • Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
  • Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
  • n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions
  • The Future of Cybersecurity Includes Non-Human Employees
  • Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication

Copyright © TheCyberSecurity.News, All Rights Reserved.