Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

TC Sessions: AI Trivia Countdown — score big on tickets

June 1, 2025

Shubman Gill named India’s new Test captain

June 1, 2025

Oscar Isaac, Mia Goth Tease ‘Frankenstein’ and Jacob Elordi’s Monster

June 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers
Cybersecurity

Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers

HarishBy HarishApril 17, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


Apr 17, 2025Ravie LakshmananCybersecurity / Malware

Fake Binance and TradingView Installers

Microsoft is calling attention to an ongoing malvertising campaign that makes use of Node.js to deliver malicious payloads capable of information theft and data exfiltration.

The activity, first detected in October 2024, uses lures related to cryptocurrency trading to trick users into installing a rogue installer from fraudulent websites that masquerade as legitimate software like Binance or TradingView.

The downloaded installer comes embedded with a dynamic-link library (“CustomActions.dll”) that’s responsible for harvesting basic system information using Windows Management Instrumentation (WMI) and setting up persistence on the host via a scheduled task.

In an attempt to keep up the ruse, the DLL launches a browser window via “msedge_proxy.exe” that displays the legitimate cryptocurrency trading website. It’s worth noting that “msedge_proxy.exe” can be used to display any website as a web application.

Cybersecurity

The scheduled task, in the meanwhile, is configured to run PowerShell commands to download from a remote server additional scripts, which take care of excluding the running PowerShell process as well as the current directory from being scanned by Microsoft Defender for Endpoint as a way to sidestep detection.

Once the exclusions are set, an obfuscated PowerShell command is run to fetch and run scripts from remote URLs that are capable of gathering extensive information related to the operation system, BIOS, hardware, and installed applications.

All the captured data is converted into JSON format and sent to the command-and-control (C2) server using an HTTPS POST request.

The attack chain then proceeds to the next phase where another PowerShell script is launched to download an archive file from the C2 that contains the Node.js runtime binary and a JavaScript compiled (JSC) file. The Node.js executable kick-starts the execution of the JSC file, which goes to establish network connections and likely siphon sensitive browser information.

Node.js Malware Campaign

In an alternate infection sequence observed by Microsoft, the ClickFix strategy has been employed to enable inline JavaScript execution, using a malicious PowerShell command to download the Node.js binary and use it to run JavaScript code directly, instead of from a file.

The inline JavaScript carries out network discovery activities to identify high-value assets, disguises the C2 traffic as legitimate Cloudflare activity to fly under the radar, and gains persistence by modifying Windows Registry run keys.

“Node.js is an open-source, cross-platform JavaScript runtime environment that allows JavaScript code to run outside of a web browser,” the tech giant said. “It’s widely used and trusted by developers because it lets them build frontend and backend applications.”

“However, threat actors are also leveraging these Node.js characteristics to try to blend malware with legitimate applications, bypass conventional security controls, and persist in target environments.”

The disclosure comes as CloudSEK revealed that a fake PDF-to-DOCX converter site impersonating PDF Candy (candyxpdf[.]com or candyconverterpdf[.]com) has been found leveraging the ClickFix social engineering trick to coax victims into running encoded PowerShell commands that ultimately deploy SectopRAT (aka ArechClient2) malware.

“The threat actors meticulously replicated the user interface of the genuine platform and registered similar-looking domain names to deceive users,” security researcher Varun Ajmera said in a report published this week.

Cybersecurity

“The attack vector involves tricking victims into executing a PowerShell command that installs Arechclient2 malware, a variant of the dangerous SectopRAT information stealer family known for harvesting sensitive data from compromised systems.”

Phishing campaigns have also been observed using a PHP-based kit to target companies’ employees with human resources (HR)-themed scams to gain unauthorized access to payroll portals and change victims’ bank account information to redirect funds to an account under the threat actor’s control.

Some of these activities have been attributed to a hacking group called Payroll Pirates, with the attackers utilizing malicious search advertising campaigns with sponsored phishing websites and spoofed HR pages via Google to lure unsuspecting victims into providing their credentials and two-factor authentication (2FA) codes.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
Next Article Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords
Harish
  • Website
  • X (Twitter)

Related Posts

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

May 31, 2025

U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

May 31, 2025

Rust-Based EDDIESTEALER Malware Uses ClickFix CAPTCHA Trick to Steal Browser Data

May 30, 2025

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

May 30, 2025

A Healthcare CISO’s Journey to Enabling Modern Care

May 30, 2025

U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

TC Sessions: AI Trivia Countdown — score big on tickets

June 1, 2025

Shubman Gill named India’s new Test captain

June 1, 2025

Oscar Isaac, Mia Goth Tease ‘Frankenstein’ and Jacob Elordi’s Monster

June 1, 2025

Netflix Tudum 2025: ‘Stranger Things,’ ‘Wednesday,’ ‘Squid Game’ news

June 1, 2025
Don't Miss
Blockchain

BitMEX discovers cybersecurity lapses in North Korea hacker group

May 31, 20253 Mins Read

The BitMEX crypto exchange’s security team discovered gaps in the operational security of the Lazarus…

Insurers Race to Cover Crypto Kidnap and Ransom Risks

May 31, 2025

FTX Bankruptcy Estate distributes $5 billion

May 30, 2025

MEXC detects 200% surge in fraud during Q1

May 30, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

TC Sessions: AI Trivia Countdown — score big on tickets

June 1, 2025

NAACP calls on Memphis officials to halt operations at xAI’s ‘dirty data center’

May 31, 2025

Meta plans to automate many of its product risk assessments

May 31, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.