Threat actors misuse Node.js to deliver malware and other malicious payloads
Since October 2024, threat actors have been leveraging Node.js to deliver malware and payloads for information theft and data exfiltration. A recent malvertising campaign uses cryptocurrency trading themes to lure users into downloading malicious installers. The attack chain includes initial access, persistence, defense evasion, data collection, and payload delivery. The malware gathers system information, sets up scheduled tasks, and uses PowerShell for various malicious activities. Another emerging technique involves inline JavaScript execution through Node.js. Recommendations include educating users, monitoring Node.js execution, enforcing PowerShell logging, and implementing endpoint protection.
AI Analysis
Technical Summary
Since October 2024, threat actors have been exploiting the Node.js runtime environment as a vector to deliver malware and other malicious payloads aimed at information theft and data exfiltration. The campaign employs malvertising techniques themed around cryptocurrency trading to lure users into downloading malicious installers. The attack chain is multi-staged, beginning with initial access through social engineering and malicious downloads, followed by establishing persistence via scheduled tasks. The malware gathers system information and uses PowerShell scripts for defense evasion, system reconnaissance, data collection, and payload delivery. A novel technique observed is inline JavaScript execution within Node.js, allowing attackers to run arbitrary code stealthily and evade detection. The malware families involved include ahkbot, remcos, latrodectus, stilachirat, and raccoono365, indicating a diverse and sophisticated toolkit. Indicators of compromise include multiple suspicious domains hosted on trycloudflare.com, used as command and control or payload distribution points. Although no specific Node.js vulnerabilities are exploited, the abuse of legitimate Node.js functionality and PowerShell scripting presents a significant risk vector. The complexity and stealth of the attack chain make detection challenging without focused monitoring and advanced endpoint protection.
Potential Impact
European organizations face significant risks due to the widespread use of Node.js in web applications, development environments, and automation tools across sectors such as finance, technology, and manufacturing. The cryptocurrency trading theme specifically targets financial institutions and fintech companies prevalent in Europe. Successful compromise can lead to theft of sensitive data, intellectual property loss, and regulatory penalties under GDPR due to data exfiltration. The persistence mechanisms and defense evasion techniques increase dwell time and complicate incident response, raising the risk of extensive operational disruption and reputational damage. The abuse of PowerShell and Node.js facilitates lateral movement within networks, potentially impacting critical infrastructure and enterprise environments. Organizations lacking comprehensive monitoring of scripting environments or advanced endpoint protection are particularly vulnerable. Although the threat is rated medium severity, its sophistication and stealth warrant heightened vigilance to prevent significant confidentiality, integrity, and availability impacts.
Mitigation Recommendations
European organizations should implement the following targeted measures: 1) Enforce application control policies restricting Node.js execution to approved scripts and directories, preventing unauthorized inline JavaScript execution. 2) Enhance network monitoring and DNS filtering to detect and block traffic to identified malicious domains (e.g., the listed trycloudflare.com subdomains), leveraging threat intelligence feeds. 3) Configure PowerShell constrained language mode and enable detailed script block logging and transcription to capture suspicious activity. 4) Deploy behavioral endpoint detection and response (EDR) solutions capable of identifying anomalous Node.js and PowerShell behaviors, including unusual process spawning and scheduled task creation. 5) Conduct focused user awareness training on recognizing malvertising and social engineering tactics, especially those related to cryptocurrency themes. 6) Regularly audit scheduled tasks and startup items to detect unauthorized persistence mechanisms. 7) Apply multi-factor authentication and least privilege principles to limit the impact of compromised credentials used during the attack chain. These measures address the unique abuse of Node.js and PowerShell in this campaign and leverage specific indicators and attack patterns to improve detection and response.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland
Indicators of Compromise
- domain: casting-advisors-older-invitations.trycloudflare.com
- domain: complement-parliamentary-chairs-hc.trycloudflare.com
- domain: fotos-phillips-princess-baker.trycloudflare.com
- domain: investigators-boxing-trademark-threatened.trycloudflare.com
- domain: sublime-forecasts-pale-scored.trycloudflare.com
- domain: washing-cartridges-watts-flags.trycloudflare.com
Threat actors misuse Node.js to deliver malware and other malicious payloads
Description
Since October 2024, threat actors have been leveraging Node.js to deliver malware and payloads for information theft and data exfiltration. A recent malvertising campaign uses cryptocurrency trading themes to lure users into downloading malicious installers. The attack chain includes initial access, persistence, defense evasion, data collection, and payload delivery. The malware gathers system information, sets up scheduled tasks, and uses PowerShell for various malicious activities. Another emerging technique involves inline JavaScript execution through Node.js. Recommendations include educating users, monitoring Node.js execution, enforcing PowerShell logging, and implementing endpoint protection.
AI-Powered Analysis
Technical Analysis
Since October 2024, threat actors have been exploiting the Node.js runtime environment as a vector to deliver malware and other malicious payloads aimed at information theft and data exfiltration. The campaign employs malvertising techniques themed around cryptocurrency trading to lure users into downloading malicious installers. The attack chain is multi-staged, beginning with initial access through social engineering and malicious downloads, followed by establishing persistence via scheduled tasks. The malware gathers system information and uses PowerShell scripts for defense evasion, system reconnaissance, data collection, and payload delivery. A novel technique observed is inline JavaScript execution within Node.js, allowing attackers to run arbitrary code stealthily and evade detection. The malware families involved include ahkbot, remcos, latrodectus, stilachirat, and raccoono365, indicating a diverse and sophisticated toolkit. Indicators of compromise include multiple suspicious domains hosted on trycloudflare.com, used as command and control or payload distribution points. Although no specific Node.js vulnerabilities are exploited, the abuse of legitimate Node.js functionality and PowerShell scripting presents a significant risk vector. The complexity and stealth of the attack chain make detection challenging without focused monitoring and advanced endpoint protection.
Potential Impact
European organizations face significant risks due to the widespread use of Node.js in web applications, development environments, and automation tools across sectors such as finance, technology, and manufacturing. The cryptocurrency trading theme specifically targets financial institutions and fintech companies prevalent in Europe. Successful compromise can lead to theft of sensitive data, intellectual property loss, and regulatory penalties under GDPR due to data exfiltration. The persistence mechanisms and defense evasion techniques increase dwell time and complicate incident response, raising the risk of extensive operational disruption and reputational damage. The abuse of PowerShell and Node.js facilitates lateral movement within networks, potentially impacting critical infrastructure and enterprise environments. Organizations lacking comprehensive monitoring of scripting environments or advanced endpoint protection are particularly vulnerable. Although the threat is rated medium severity, its sophistication and stealth warrant heightened vigilance to prevent significant confidentiality, integrity, and availability impacts.
Mitigation Recommendations
European organizations should implement the following targeted measures: 1) Enforce application control policies restricting Node.js execution to approved scripts and directories, preventing unauthorized inline JavaScript execution. 2) Enhance network monitoring and DNS filtering to detect and block traffic to identified malicious domains (e.g., the listed trycloudflare.com subdomains), leveraging threat intelligence feeds. 3) Configure PowerShell constrained language mode and enable detailed script block logging and transcription to capture suspicious activity. 4) Deploy behavioral endpoint detection and response (EDR) solutions capable of identifying anomalous Node.js and PowerShell behaviors, including unusual process spawning and scheduled task creation. 5) Conduct focused user awareness training on recognizing malvertising and social engineering tactics, especially those related to cryptocurrency themes. 6) Regularly audit scheduled tasks and startup items to detect unauthorized persistence mechanisms. 7) Apply multi-factor authentication and least privilege principles to limit the impact of compromised credentials used during the attack chain. These measures address the unique abuse of Node.js and PowerShell in this campaign and leverage specific indicators and attack patterns to improve detection and response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.microsoft.com/en-us/security/blog/2025/04/15/threat-actors-misuse-node-js-to-deliver-malware-and-other-malicious-payloads"]
- Adversary
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domaincasting-advisors-older-invitations.trycloudflare.com | — | |
domaincomplement-parliamentary-chairs-hc.trycloudflare.com | — | |
domainfotos-phillips-princess-baker.trycloudflare.com | — | |
domaininvestigators-boxing-trademark-threatened.trycloudflare.com | — | |
domainsublime-forecasts-pale-scored.trycloudflare.com | — | |
domainwashing-cartridges-watts-flags.trycloudflare.com | — |
Threat ID: 682c992c7960f6956616a891
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 6/19/2025, 6:02:57 PM
Last updated: 11/21/2025, 11:43:11 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
MediumSyncro + Lovable: RAT delivery via AI-generated websites | Kaspersky official blog
MediumNew Sturnus Android Malware Reads WhatsApp, Telegram, Signal Chats via Accessibility Abuse
MediumChinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks
MediumThe Tsundere botnet uses the Ethereum blockchain to infect its targets
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.