Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

No More Safe Heaven for Privacy? Switzerland Drifts Toward a Surveillance State Due to New Controversial Laws

June 3, 2025

Yakuza 0: Director’s Cut Game Streams Overview Trailer with Hotline Number – News

June 3, 2025

Your Score: Simulcast Week of 2025-05-27

June 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers
Cybersecurity

Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers

HarishBy HarishApril 17, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


Apr 17, 2025Ravie LakshmananCybersecurity / Malware

Fake Binance and TradingView Installers

Microsoft is calling attention to an ongoing malvertising campaign that makes use of Node.js to deliver malicious payloads capable of information theft and data exfiltration.

The activity, first detected in October 2024, uses lures related to cryptocurrency trading to trick users into installing a rogue installer from fraudulent websites that masquerade as legitimate software like Binance or TradingView.

The downloaded installer comes embedded with a dynamic-link library (“CustomActions.dll”) that’s responsible for harvesting basic system information using Windows Management Instrumentation (WMI) and setting up persistence on the host via a scheduled task.

In an attempt to keep up the ruse, the DLL launches a browser window via “msedge_proxy.exe” that displays the legitimate cryptocurrency trading website. It’s worth noting that “msedge_proxy.exe” can be used to display any website as a web application.

Cybersecurity

The scheduled task, in the meanwhile, is configured to run PowerShell commands to download from a remote server additional scripts, which take care of excluding the running PowerShell process as well as the current directory from being scanned by Microsoft Defender for Endpoint as a way to sidestep detection.

Once the exclusions are set, an obfuscated PowerShell command is run to fetch and run scripts from remote URLs that are capable of gathering extensive information related to the operation system, BIOS, hardware, and installed applications.

All the captured data is converted into JSON format and sent to the command-and-control (C2) server using an HTTPS POST request.

The attack chain then proceeds to the next phase where another PowerShell script is launched to download an archive file from the C2 that contains the Node.js runtime binary and a JavaScript compiled (JSC) file. The Node.js executable kick-starts the execution of the JSC file, which goes to establish network connections and likely siphon sensitive browser information.

Node.js Malware Campaign

In an alternate infection sequence observed by Microsoft, the ClickFix strategy has been employed to enable inline JavaScript execution, using a malicious PowerShell command to download the Node.js binary and use it to run JavaScript code directly, instead of from a file.

The inline JavaScript carries out network discovery activities to identify high-value assets, disguises the C2 traffic as legitimate Cloudflare activity to fly under the radar, and gains persistence by modifying Windows Registry run keys.

“Node.js is an open-source, cross-platform JavaScript runtime environment that allows JavaScript code to run outside of a web browser,” the tech giant said. “It’s widely used and trusted by developers because it lets them build frontend and backend applications.”

“However, threat actors are also leveraging these Node.js characteristics to try to blend malware with legitimate applications, bypass conventional security controls, and persist in target environments.”

The disclosure comes as CloudSEK revealed that a fake PDF-to-DOCX converter site impersonating PDF Candy (candyxpdf[.]com or candyconverterpdf[.]com) has been found leveraging the ClickFix social engineering trick to coax victims into running encoded PowerShell commands that ultimately deploy SectopRAT (aka ArechClient2) malware.

“The threat actors meticulously replicated the user interface of the genuine platform and registered similar-looking domain names to deceive users,” security researcher Varun Ajmera said in a report published this week.

Cybersecurity

“The attack vector involves tricking victims into executing a PowerShell command that installs Arechclient2 malware, a variant of the dangerous SectopRAT information stealer family known for harvesting sensitive data from compromised systems.”

Phishing campaigns have also been observed using a PHP-based kit to target companies’ employees with human resources (HR)-themed scams to gain unauthorized access to payroll portals and change victims’ bank account information to redirect funds to an account under the threat actor’s control.

Some of these activities have been attributed to a hacking group called Payroll Pirates, with the attackers utilizing malicious search advertising campaigns with sponsored phishing websites and spoofed HR pages via Google to lure unsuspecting victims into providing their credentials and two-factor authentication (2FA) codes.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
Next Article Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords
Harish
  • Website
  • X (Twitter)

Related Posts

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

June 2, 2025

Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN

June 2, 2025

Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU

June 2, 2025

APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

June 2, 2025

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

June 2, 2025

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

June 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

No More Safe Heaven for Privacy? Switzerland Drifts Toward a Surveillance State Due to New Controversial Laws

June 3, 2025

Yakuza 0: Director’s Cut Game Streams Overview Trailer with Hotline Number – News

June 3, 2025

Your Score: Simulcast Week of 2025-05-27

June 3, 2025

Australia overhauls crypto ATM rules to combat rising scams

June 3, 2025
Don't Miss
Blockchain

Australia overhauls crypto ATM rules to combat rising scams

June 3, 20253 Mins Read

Australia’s national financial intelligence agency has rolled out new operating rules and transaction limits for…

Ethereum Foundation restructures, rebrands Protocol team

June 2, 2025

This platform simplifies launching privacy-first AI applications for developers

June 2, 2025

The urgent need for DePIN.

June 2, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Console raises $6.2M from Thrive to free IT teams from mundane tasks with AI

June 2, 2025

Microsoft Bing gets a free Sora-powered AI video generator

June 2, 2025

Snowflake to acquire database startup Crunchy Data

June 2, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.