NodeCordRAT in Malicious npm pkgs Steals Wallets via Discord

Malicious npm packages delivered NodeCordRAT, a Discord‑controlled RAT that steals browser credentials, API tokens and crypto wallet seed phrases

  • Researchers discovered three malicious npm packages that delivered a new remote access trojan called NodeCordRAT.
  • The packages — uploaded by user wenmoonx and removed by November 2025 — used post-install scripts to run a payload contained in bip40.
  • NodeCordRAT steals browser credentials, API tokens, and crypto wallet seed phrases and uses a hard-coded Discord server for command-and-control.

On Jan. 8, 2026, researchers reported that three malicious packages on npm delivered a previously undocumented Malware called NodeCordRAT. The packages were uploaded by a user named wenmoonx and had been taken down as of November 2025, according to the report linked by researchers discovered.

- Advertisement -

The campaign included packages named to resemble real libraries. The actor copied names from the legitimate bitcoinjs project repositories, researchers noted and linked to the original bitcoinjs repos. Two packages, Bitcoin-main-lib and bitcoin-lib-js, used a postinstall script to execute a secondary package.

“The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload,” the report said. The installed package, bip40, contained the final payload identified as NodeCordRAT.

NodeCordRAT fingerprints infected hosts across Windows, Linux, and macOS to create unique identifiers. It opens a covert channel to a hard-coded Discord server to receive commands, including the ability to run shell commands, capture screenshots, and upload files. The observed commands included !run, !screenshot, and !sendfile.

“This data is exfiltrated using Discord’s API with a hardcoded token and sent to a private channel,” the researchers said, noting that stolen files are uploaded via Discord’s REST endpoint /channels/{id}/messages. The malware can harvest Google Chrome credentials, API tokens, and seed phrases from wallets such as MetaMask.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

AI Stock Overvaluation Could Propel Bitcoin Higher: Analyst

Macro strategist Lyn Alden suggests Bitcoin's next major rally may depend on capital rotating...

Dubai, Maldives Advance Multi-Million Real Estate Tokenization

Dubai Land Department launched phase two of a real estate tokenization pilot following the...

Top Aave DAO Developer Quits in “Devastating” Split.

Bored Ghosts Developing, a key Aave DAO contractor, will not renew its contract in...

Bitcoin Whale Selling Dominates Despite Easing Sell Pressure

Bitcoin exchange deposits have dropped from a peak of 60,000 BTC in early February...

Idle GPUs Key to Easing AI Compute Crunch

GPU prices for AI workloads have surged dramatically, with the NVIDIA RTX 5090 up...

Must Read

How to Set Up a Simple Bitcoin Tip Jar for Your Site or Stream

QUICK LINKSWhat a tip jar is, in plain wordsWhat you needBuild a payment link that just worksAdd a QR code that actually scansWhere to...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!