Malicious Bitcoin npm packages spread NodeCordRAT malware before takedown

image

Source: CryptoNewsNet Original Title: Malicious Bitcoin npm packages spread NodeCordRAT malware before takedown Original Link: Researchers at Zscaler ThreatLabz have found three malicious Bitcoin npm packages that are meant to implant malware named NodeCordRAT. Reports say that they all got more than 3,400 downloads before they were taken down from the npm registry.

The packages, which include bitcoin-main-lib, bitcoin-lib-js, and bip40, had amassed 2,300, 193, and 970 downloads. By copying names and details from real Bitcoin components, the attacker made these lookalike modules appear harmless at a glance.

“The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload,” Zscaler ThreatLabz researchers Satyam Singh and Lakhan Parashar said. “This final payload, named NodeCordRAT by ThreatLabz, is a remote access trojan (RAT) with capabilities to steal sensitive data.”

NodeCordRAT is equipped to steal Google Chrome credentials, API codes kept in .env files, and MetaMask wallet data like private keys and seed phrases.

Zscaler ThreatLabz analysts identified the trio in November while scanning the npm registry for suspicious packages and strange download patterns. NodeCordRAT represents a new malware family that leverages Discord servers for command-and-control (C2) communication.

The person who posted all three malicious packages used the email address supertalented730@gmail.com.

Attack Chain

The attack chain begins when developers unknowingly install bitcoin-main-lib or bitcoin-lib-js from npm. Then it identifies the path of the bip40 package and starts it in detached mode using PM2.

The malware generates a unique identifier for compromised machines using the format platform-uuid, such as win32-c5a3f1b4. It achieves this by extracting system UUIDs through commands like wmic csproduct get UUID on Windows or reading /etc/machine-id on Linux systems.

Historical Context: Malicious Node Packages in Crypto

Trust Wallet reported that the theft of almost $8.5 million was connected to an attack on the npm ecosystem supply chain by “Sha1-Hulud NPM.” More than 2,500 wallets were affected.

Hackers used compromised npm packages as NodeCordRAT-style trojans and supply chain malware, incorporating them into client-side code that stole money from customers when they accessed their wallets.

Other 2025 examples that resemble the NodeCordRAT-style threat include the Force Bridge exploit, which occurred between May and June 2025. Attackers stole either the software or the private keys that validator nodes used to authorize cross-chain withdrawals. This turned nodes into malicious actors that could approve fraudulent transactions.

This breach resulted in an estimated $3.6 million in stolen assets, including ETH, USDC, USDT, and other tokens. It also forced the bridge to stop operations and conduct audits.

In September, the Shibarium Bridge exploit unfolded, and attackers were able to take control of most of the validator power for a short time. This let them serve as bad validator nodes, sign off on illegal withdrawals, and take around $2.8 million in SHIB, ETH, and BONE tokens.

BTC-0.69%
ETH-1.2%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)