Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/Threats/LTX Stealer Attack Targets Users to Ex Node.js Based
Threats

LTX Stealer Attack Targets Users to Ex Node.js Based

LTX Stealer, a sophisticated new malware strain, has surfaced, employing a unique Node.js-based architecture to compromise Windows systems. First surfacing in early 2026, this malicious tool is...

Sarah simpson
Sarah simpson
February 9, 2026 3 Min Read
6 0

LTX Stealer, a sophisticated new malware strain, has surfaced, employing a unique Node.js-based architecture to compromise Windows systems.

First surfacing in early 2026, this malicious tool is designed to harvest sensitive user information, including login credentials, browser cookies, and cryptocurrency wallet data.

The malware distinguishes itself by packaging a full Node.js runtime environment within its payload, allowing it to execute complex JavaScript code natively on the victim’s machine without requiring prior installation of the framework.

The attack typically begins with a deceptively simple entry point: a Windows installer file named “Negro.exe”. This file is built using the legitimate Inno Setup framework, a common tool for creating software installers.

By hiding within a trusted installation wrapper, the malware effectively masks its malicious intent from standard security scans. Upon execution, the installer drops a massive payload—roughly 271 MB in size—into the victim’s system.

Cyfirma analysts identified the malware shortly after its appearance, noting that this large file size is a deliberate tactic to bypass antivirus engines that often skip scanning bulky files to maintain system performance.

Once inside, LTX Stealer targets Chromium-based browsers like Google Chrome and Microsoft Edge. It accesses the “Local State” files to extract encryption keys, which are then used to unlock saved passwords and session cookies.

Simultaneously, the malware scans for cryptocurrency wallets and takes screenshots of the user’s activity.

All stolen data is compressed and prepared for exfiltration to a command-and-control server.

The attackers utilize cloud services like Supabase for authentication and Cloudflare to hide their server’s true location, making the infrastructure resilient against takedowns.

Obfuscation via Bytecode Compilation

A defining technical characteristic of LTX Stealer is its heavy reliance on advanced obfuscation techniques to hinder reverse engineering.

The primary payload, updater.exe, is not a standard executable but a packaged Node.js application created using a tool called pkg. This bundles the malicious JavaScript logic, dependencies, and the runtime into a single binary.

LTX Stealer Installer Properties (Source - Cyfirma)
LTX Stealer Installer Properties (Source – Cyfirma)

To further protect their code, the developers compiled the JavaScript source into bytecode (.jsc) using Bytenode. This conversion process transforms readable code into a binary format that is extremely difficult for security researchers to decompile or analyze.

Chromium Master Key Decryption Flow (Source - Cyfirma)
Chromium Master Key Decryption Flow (Source – Cyfirma)

By removing the original source code entirely, the attackers ensure that understanding the malware’s internal logic requires specialized knowledge of Node.js internals, significantly raising the bar for analysis and detection.

To defend against LTX Stealer, organizations should implement the following measures:-

  • Block Known Indicators: Configure firewalls and endpoint detection systems to block traffic to domains like eqp.lol and IP addresses associated with the malware’s control panel.
  • Monitor File Creation: Alert on the creation of hidden or system-marked directories within user-accessible paths, specifically those mimicking legitimate vendors like “Microsoft Updater”.
  • Flag Large Binaries: Investigate unsigned executables that are unusually large (over 100MB) and exhibit runtime behaviors consistent with Node.js applications.
  • Detect Credential Access: Monitor for processes that sequentially access browser “Local State” files and credential stores, as this behavior is highly indicative of info-stealing activity.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

European Commission Stops Cyberattack on Staff Mobile Data

Next Post

ScarCruft Abuses Cloud Services & OLE to Legitimate OLE-based

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us