NodeCordRAT in Malicious npm pkgs Steals Wallets via Discord

Malicious npm packages delivered NodeCordRAT, a Discord‑controlled RAT that steals browser credentials, API tokens and crypto wallet seed phrases

  • Researchers discovered three malicious npm packages that delivered a new remote access trojan called NodeCordRAT.
  • The packages — uploaded by user wenmoonx and removed by November 2025 — used post-install scripts to run a payload contained in bip40.
  • NodeCordRAT steals browser credentials, API tokens, and crypto wallet seed phrases and uses a hard-coded Discord server for command-and-control.

On Jan. 8, 2026, researchers reported that three malicious packages on npm delivered a previously undocumented Malware called NodeCordRAT. The packages were uploaded by a user named wenmoonx and had been taken down as of November 2025, according to the report linked by researchers discovered.

- Advertisement -

The campaign included packages named to resemble real libraries. The actor copied names from the legitimate bitcoinjs project repositories, researchers noted and linked to the original bitcoinjs repos. Two packages, Bitcoin-main-lib and bitcoin-lib-js, used a postinstall script to execute a secondary package.

“The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload,” the report said. The installed package, bip40, contained the final payload identified as NodeCordRAT.

NodeCordRAT fingerprints infected hosts across Windows, Linux, and macOS to create unique identifiers. It opens a covert channel to a hard-coded Discord server to receive commands, including the ability to run shell commands, capture screenshots, and upload files. The observed commands included !run, !screenshot, and !sendfile.

“This data is exfiltrated using Discord’s API with a hardcoded token and sent to a private channel,” the researchers said, noting that stolen files are uploaded via Discord’s REST endpoint /channels/{id}/messages. The malware can harvest Google Chrome credentials, API tokens, and seed phrases from wallets such as MetaMask.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Analyst: XRP Poised for 2026 Breakout Toward $8–$10 +Upside

XRP surged from $0.24 to $2.46 in January 2018, a near 900% rise that...

Tariff Ruling Threat Looms; Solana Outperforms, Crypto Holds

Overall crypto market cap remained near $3.2 trillion as traders awaited a U.S. Supreme...

Iran Internet Cut: Satellites, Mesh Keep Crypto Usable Today

Iran cut internet access as nationwide protests spread, complicating digital payments and crypto use.About...

Coinbase Gains After Second Wall Street Upgrade Ahead of Q4.

Coinbase shares rose in after-hours trade after receiving a second Wall Street upgrade ahead...

Spot Bitcoin ETFs See $935M Outflows, Rally Faces Resistance

U.S. spot Bitcoin ETFs posted three consecutive days of outflows totaling about $934.8 million.Daily...
- Advertisement -

Must Read

6 Best VPN Providers That Accept Monero

Privacy and anonymity are probably the most important things that we should all consider in today's internet era. Although there are a lot of...
Bitcoin (BTC) $ 90,622.00 0.09%
Ethereum (ETH) $ 3,107.82 0.67%
XRP (XRP) $ 2.12 0.44%
Bittensor (TAO) $ 278.93 0.09%
Polkadot (DOT) $ 2.10 1.62%
Cardano (ADA) $ 0.396765 0.23%
Chainlink (LINK) $ 13.26 0.55%
Hyperliquid (HYPE) $ 25.91 2.51%
Monero (XMR) $ 462.67 3.92%
Hedera (HBAR) $ 0.119882 2.39%
Toncoin (TON) $ 1.78 3.80%