NodeCordRAT in Malicious npm pkgs Steals Wallets via Discord

Malicious npm packages delivered NodeCordRAT, a Discord‑controlled RAT that steals browser credentials, API tokens and crypto wallet seed phrases

  • Researchers discovered three malicious npm packages that delivered a new remote access trojan called NodeCordRAT.
  • The packages — uploaded by user wenmoonx and removed by November 2025 — used post-install scripts to run a payload contained in bip40.
  • NodeCordRAT steals browser credentials, API tokens, and crypto wallet seed phrases and uses a hard-coded Discord server for command-and-control.

On Jan. 8, 2026, researchers reported that three malicious packages on npm delivered a previously undocumented Malware called NodeCordRAT. The packages were uploaded by a user named wenmoonx and had been taken down as of November 2025, according to the report linked by researchers discovered.

- Advertisement -

The campaign included packages named to resemble real libraries. The actor copied names from the legitimate bitcoinjs project repositories, researchers noted and linked to the original bitcoinjs repos. Two packages, Bitcoin-main-lib and bitcoin-lib-js, used a postinstall script to execute a secondary package.

“The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload,” the report said. The installed package, bip40, contained the final payload identified as NodeCordRAT.

NodeCordRAT fingerprints infected hosts across Windows, Linux, and macOS to create unique identifiers. It opens a covert channel to a hard-coded Discord server to receive commands, including the ability to run shell commands, capture screenshots, and upload files. The observed commands included !run, !screenshot, and !sendfile.

“This data is exfiltrated using Discord’s API with a hardcoded token and sent to a private channel,” the researchers said, noting that stolen files are uploaded via Discord’s REST endpoint /channels/{id}/messages. The malware can harvest Google Chrome credentials, API tokens, and seed phrases from wallets such as MetaMask.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Adobe CEO Steps Down Amid AI-Driven Leadership Shifts

Adobe CEO Shantanu Narayen is stepping down as the company intensifies its generative AI...

MEV bot sandwiches user for millions in $50M swap

A crypto trader lost millions swapping $50.4 million USDt for just 327 AAVE tokens...

White House Demands ABC News Retract Iran Drone Report

The White House demanded ABC News retract a story about a potential Iranian drone...

Robinhood Crypto Volumes Leap 74% as Bitcoin Holds Strong

Robinhood's crypto trading volume surged 74% YoY in February 2026 to $25.0 billion, despite...

BlackRock’s Ethereum Staking ETF Debuts With $15.5M Volume

BlackRock's new staked Ethereum ETF, ETHB, launched with $15.5 million in trading volume, described...

Must Read

The Best Bitcoin Casinos of 2025: An Expert’s Data-Driven Guide

Key TakeawaysA Deep Dive into the Top Bitcoin Casinos of 2025Bitcoin Casino Comparison Table1. Stake.com: Best for Variety & Integrated Sports Betting2. BC.Game: Best...