InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Stealit malware exploits a single executable feature in Node.js via game and VPN installers
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Stealit malware exploits a single executable feature in Node.js via game and VPN installers
Technology

Stealit malware exploits a single executable feature in Node.js via game and VPN installers

October 10, 2025 4 Min Read
Share
Stealit Malware Abuses Node.js Single Executable Feature
SHARE

Cybersecurity researchers have revealed details of an active malware campaign called “. stearit It leverages the Single Executable Application (SEA) feature of Node.js as a way to distribute payloads.

According to Fortinet FortiGuard Labs, some iterations also employ the open-source Electron framework for malware delivery. The malware is assessed to be propagating through fake installers for games and VPN applications uploaded to file-sharing sites such as Mediafire and Discord.

SEA is a feature that allows you to package and distribute Node.js applications as standalone executables, even on systems that do not have Node.js installed.

“Both approaches are effective for distributing Node.js-based malware because they can run without requiring a pre-installed Node.js runtime or additional dependencies,” security researchers Eduardo Altares and Joie Salvio said in a report shared with The Hacker News.

On its dedicated website, the attackers behind Stealit claim to offer “professional data extraction solutions” through several subscription plans. This includes remote access Trojans (RATs) that support file extraction, webcam control, live screen monitoring, and ransomware deployment targeting both Android and Windows operating systems.

Windows Stealer prices range from $29.99 for a weekly subscription to $499.99 for a perpetual license. Meanwhile, Android RAT prices range from $99.99 to $1,999.99.

Note that the fake executable contains an installer designed to retrieve and install the main components of the malware obtained from command and control (C2), but before doing so it performs a number of anti-analysis checks to ensure that it is running within a virtual or sandboxed environment.

An important part of this step involves writing a Base64-encoded authentication key (a 12-character alphanumeric key) to the %temp%cache.json file. This key is used to authenticate with the C2 server and to log into the dashboard for subscribers to monitor and control their victims.

The malware is also designed to configure exclusions in Microsoft Defender Antivirus so that folders containing downloaded components are not flagged. The functions of the three executables are:

  • save data.exethe malware will only be downloaded and executed if it is running with elevated privileges. It is designed to extract information from Chromium-based browsers by dropping a tool named “cache.exe” that is part of the open source project ChromElevator.
  • stats_db.exeis designed to extract information from messengers (Telegram, WhatsApp), cryptocurrency wallets and wallet browser extensions (Atomic and Exodus), and gaming-related apps (Steam, Minecraft, GrowTopia, and Epic Games Launcher).
  • game cache.exeIt is designed to set persistence on the host by writing a Visual Basic script and communicating with the C2 server to wake up the host on system reboot, stream the victim’s screen in real time, execute arbitrary commands, download/upload files, and change the desktop wallpaper.

“This new Stealit campaign leverages the experimental Node.js Single Executable Application (SEA) feature, which is still in active development, to easily distribute malicious scripts to systems that do not have Node.js installed,” Fortinet said. “The attackers behind this may be looking to exploit the novelty of this feature and rely on the element of surprise, catching security applications and malware analysts off guard.”

See also  Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Share This Article
Twitter Copy Link
Previous Article New roguelite Absolum received a big launch discount, but you should get started right away New roguelite Absolum received a big launch discount, but you should get started right away
Next Article Maine Gov. Janet Mills will challenge Sen. Susan Collins, Associated Press sources report Maine Gov. Janet Mills will challenge Sen. Susan Collins, Associated Press sources report

Latest News

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025
North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

The North Korean threat actors behind the Contagious Interview campaign…

November 29, 2025

You Might Also Like

comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack
Technology

comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack

5 Min Read
WhatsApp Worm, Critical CVE, Oracle 0-Day, Ransomware Cartel, and More
Technology

WhatsApp Worm, Critical CVE, Oracle 0-Day, Ransomware Cartel, and More

25 Min Read
Batshadow Group hunts job seekers using the new GO-based "Vampire Bot" malware
Technology

Batshadow Group hunts job seekers using the new GO-based “Vampire Bot” malware

4 Min Read
Add Google Pixel 10 C2PA support to verify the reliability of AI-generated media
Technology

Add Google Pixel 10 C2PA support to verify the reliability of AI-generated media

3 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?