Tuesday, April 22, 2025
HomeCyber Security NewsHackers Exploit Node.js to Spread Malware and Exfiltrate Data

Hackers Exploit Node.js to Spread Malware and Exfiltrate Data

Published on

SIEM as a Service

Follow Us on Google News

Threat actors are increasingly targeting Node.js—a staple tool for modern web developers—to launch sophisticated malware campaigns aimed at data theft and system compromise.

Microsoft Defender Experts (DEX) have reported a spike in such attacks since October 2024, especially focusing on malvertising and deceptive software installers.

Node.js: From Developer Darling to Hacker’s Tool

Node.js is an open-source JavaScript runtime, trusted for its flexibility building both front- and back-end applications.

- Advertisement - Google News

Unfortunately, the very characteristics that make Node.js a favorite among developers—cross-platform compatibility, command-line script execution, and seamless integration—are also appealing to cybercriminals.

Overview of the malvertising campaign leveraging Node.js
Overview of the malvertising campaign leveraging Node.js

Attackers are blending malicious Node.js scripts with legitimate applications, sidestepping conventional security measures.

While Python, PHP, and other scripting languages remain widely abused, the uptake of Node.js in malware delivery marks a significant shift in attacker tactics.

A notable ongoing threat involves a malvertising campaign targeting cryptocurrency enthusiasts. It entices users to visit fraudulent sites via seemingly legitimate ads, then lures them into downloading a fake installer.

This installer, typically disguised as cryptocurrency trading software, contains a malicious DLL that sets up persistence on the victim’s machine via scheduled tasks and PowerShell commands.

 Excerpts from the script that gathers and exfiltrates data
 Excerpts from the script that gathers and exfiltrates data

Once active, the malware excludes itself from Windows Defender scans, collects detailed system and user data—including BIOS, OS version, network adapters, and even browser credentials—and transmits this information to a command-and-control (C2) server controlled by the attackers.

Payload Delivery and Execution via Node.js

After gathering and exfiltrating data, the attackers deliver a secondary payload: an archive containing Node.js (node.exe), a compiled JavaScript file (JSC), and supporting modules.

The malicious JavaScript is executed, launching routines that may steal further credentials, install additional malware, or set up persistent remote access.

Command line used to launch the JSC file
Command line used to launch the JSC file

Beyond packaged executables, attackers are also leveraging Node.js for inline JavaScript execution. In some cases, attackers trick users into running PowerShell commands that download Node.js and immediately execute JavaScript code.

Excerpts from the malicious script, highlighting core HTTP functions
Excerpts from the malicious script, highlighting core HTTP functions

This code maps corporate networks, identifies high-value assets, and disguises outbound traffic as legitimate, making detection even harder.

Security experts urge organizations to:

  • Educate users on the dangers of downloading software from unverified sources.
  • Monitor for unexpected node.exe and PowerShell activity.
  • Enforce script logging and endpoint protection.
  • Restrict outbound connections to suspicious domains and employ robust firewall rules.

With Node.js malware techniques growing in sophistication and frequency, vigilance and proactive defense are essential for safeguarding sensitive information in today’s evolving cybersecurity landscape.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...