Article Details

Scrape Timestamp (UTC): 2025-10-10 14:25:27.147

Source: https://thehackernews.com/2025/10/stealit-malware-abuses-nodejs-single.html

Original Article Text

Click to Toggle View

Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers. Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single Executable Application (SEA) feature as a way to distribute its payloads. According to Fortinet FortiGuard Labs, select iterations have also employed the open-source Electron framework to deliver the malware. It's assessed that the malware is being propagated through counterfeit installers for games and VPN applications that are uploaded to file-sharing sites such as Mediafire and Discord. SEA is a feature that allows Node.js applications to be packaged and distributed as a standalone executable, even on systems without Node.js installed. "Both approaches are effective for distributing Node.js-based malware, as they allow execution without requiring a pre-installed Node.js runtime or additional dependencies," security researchers Eduardo Altares and Joie Salvio said in a report shared with The Hacker News. On a dedicated website, the threat actors behind Stealit claim to offer "professional data extraction solutions" via several subscription plans. This includes a remote access trojan (RAT) that supports file extraction, webcam control, live screen monitoring, and ransomware deployment targeting both Android and Windows operating systems. Prices for the Windows Stealer range from $29.99 for a weekly subscription to $499.99 for a lifetime license. The Android RAT pricing, on the other hand, goes from $99.99 all the way to $1,999.99. The fake executables contain an installer that's designed to retrieve the main components of the malware retrieved from a command-and-control (C2) and install them, but note that before performing a number of anti-analysis checks to ensure it's running inside a virtual or sandboxed environment. A crucial aspect of this step involves writing a Base64-encoded authentication key, a 12-character alphanumeric key, to the %temp%\cache.json file. This key is used to authenticate with the C2 server, as well as by subscribers to log in to the dashboard in order to likely monitor and control their victims. The malware is also engineered to configure Microsoft Defender Antivirus exclusions so that the folder that contains the downloaded components is not flagged. The functions of the three executables are as follows - "This new Stealit campaign leverages the experimental Node.js Single Executable Application (SEA) feature, which is still under active development, to conveniently distribute malicious scripts to systems without Node.js installed," Fortinet said. "Threat actors behind this may be exploiting the feature's novelty, relying on the element of surprise, and hoping to catch security applications and malware analysts off guard."

Daily Brief Summary

MALWARE // Stealit Malware Exploits Node.js SEA Feature in Latest Campaign

Fortinet FortiGuard Labs identified Stealit malware leveraging Node.js' Single Executable Application feature to distribute payloads via fake game and VPN installers.

The malware utilizes the open-source Electron framework, enabling execution on systems without a pre-installed Node.js runtime.

Stealit is propagated through counterfeit installers on platforms like Mediafire and Discord, targeting both Windows and Android systems.

The malware offers functionalities such as file extraction, webcam control, live screen monitoring, and ransomware deployment, available through subscription plans.

A Base64-encoded authentication key is used to authenticate with the command-and-control server and manage victim control dashboards.

Stealit configures Microsoft Defender Antivirus exclusions to avoid detection, employing anti-analysis checks against virtual or sandboxed environments.

This campaign exploits the novelty of Node.js SEA, potentially bypassing security applications and surprising malware analysts.