Threat actors misuse Node.js to deliver malware and other malicious payloads

April 16, 2025, 2:21 p.m.

Description

Since October 2024, threat actors have been leveraging Node.js to deliver malware and payloads for information theft and data exfiltration. A recent malvertising campaign uses cryptocurrency trading themes to lure users into downloading malicious installers. The attack chain includes initial access, persistence, defense evasion, data collection, and payload delivery. The malware gathers system information, sets up scheduled tasks, and uses PowerShell for various malicious activities. Another emerging technique involves inline JavaScript execution through Node.js. Recommendations include educating users, monitoring Node.js execution, enforcing PowerShell logging, and implementing endpoint protection.

Date

  • Created: April 15, 2025, 8:46 p.m.
  • Published: April 15, 2025, 8:46 p.m.
  • Modified: April 16, 2025, 2:21 p.m.

Attack Patterns

  • RaccoonO365
  • BruteRatel C4
  • StilachiRAT
  • Latrodectus
  • AHKBot
  • Remcos