-
Microsoft said it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving “credible reports” in August 2025 that unknown threat actors were abusing the backward compatibility feature to gain unauthorized access to users’ devices. “Threat actors were leveraging basic social engineering techniques alongside unpatched (0-day) exploits in Internet Explorer’s JavaScript
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated new malware campaign targeting Windows systems has emerged, leveraging Node.js Single Executable Application (SEA) features to distribute malicious payloads while evading traditional detection mechanisms.
The Stealit malware represents a significant evolution in malware-as-a-service operations, combining advanced obfuscation techniques with extensive anti-analysis capabilities to establish persistent control over infected systems.
The campaign has been observed distributing disguised installers for popular software including games and VPN applications through file-sharing platforms like Mediafire and Discord.
These malicious packages utilize PyInstaller bundling and compressed archives to conceal their true nature, making initial detection challenging for users and security solutions.
.webp)
Stealit homepage (Source – Fortinet) The malware’s operators have established a commercial infrastructure complete with subscription pricing models, promotional channels, and customer support services.
.webp)
Stealit subscription pricing (Source – Fortinet) Fortinet analysts identified this active campaign following a spike in detections of Visual Basic scripts used for persistence mechanisms.
The threat represents a departure from earlier Stealit variants that relied on Electron frameworks, now adopting Node.js native SEA functionality to create standalone binaries that execute without requiring pre-installed Node.js runtimes or additional dependencies.
The malware demonstrates sophisticated evasion capabilities through multiple detection layers targeting virtual environments, debugging tools, and analysis platforms.
.webp)
A promotional post on StealIt’s Telegram channel (Source – Fortinet) These anti-analysis checks examine system specifications including memory allocation, CPU core counts, and hostname patterns to identify potential research environments.
The campaign operators maintain an active command-and-control infrastructure through domains like iloveanimals[.]shop, providing centralized management for compromised systems.
Technical Implementation and Execution Flow
The Stealit malware employs a multi-layered architecture beginning with an installer component that downloads additional modules from its command-and-control servers.
The initial payload utilizes Node.js SEA functionality to embed malicious scripts within seemingly legitimate executable files, with the core script stored as raw data resource NODE_SEA_BLOB containing both execution code and original development paths.
The installer implements extensive anti-analysis measures including virtual environment detection through system resource verification, timing analysis for mathematical operations, and process enumeration to identify debugging applications.
Registry checks examine locations like HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AeDebug for debugger configurations, while DLL injection analysis reviews loaded modules for analysis-related libraries.
Upon successful environment validation, the malware establishes persistence through multiple mechanisms including Visual Basic scripts placed in Windows startup folders and PowerShell commands to exclude directories from Windows Defender scanning.
The system downloads three core components: save_data.exe for privileged operations, stats_db.exe for data extraction, and game_cache.exe for command-and-control communication.
The save_data component deploys ChromElevator-based tools for extracting information from Chromium browsers, while stats_db.exe targets extensive application categories including gaming platforms like Steam and Minecraft, messaging services like WhatsApp and Telegram, and cryptocurrency wallets including Atomic and Exodus.
The game_cache module handles remote access trojan functionality including screen capture, webcam access, file manipulation, and command execution capabilities.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post New Stealit Malware Attacking Windows Systems Abuses Node.js Extensions appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft has successfully addressed one of Windows 11’s most frustrating issues with its latest preview builds, finally fixing the notorious “update and shut down” glitch that has plagued users since the operating system’s 2021 launch. This persistent bug tricked countless users into believing their computers were powering down when updates were pending, only to discover […]
The post Microsoft Finally Resolves Persistent Windows 11 ‘Update and Shut Down’ Glitch appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical security vulnerability has been discovered in Happy DOM, a popular JavaScript library used for server-side rendering and testing frameworks. The flaw, tracked as CVE-2025-61927, enables attackers to escape the virtual machine context and execute arbitrary code on affected systems, potentially compromising millions of applications worldwide. Critical VM Context Escape Vulnerability Happy DOM versions 19 […]
The post Happy DOM Flaw Allows Remote Code Execution Affecting 2.7 Million Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers have uncovered a sophisticated new campaign targeting WhatsApp users in Brazil with self-propagating malware designed to steal banking credentials and cryptocurrency exchange login information. The attack, first detected on September 29, 2025, represents a dangerous evolution in social engineering tactics that exploits users’ trust in familiar contacts to spread malicious payloads across messaging […]
The post WhatsApp Worm Targets Users with Banking Malware, Steals Login Information appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs GitHub as a backbone for its operations to stay resilient in the face of infrastructure takedowns. “Instead of relying solely on traditional command-and-control (C2) servers that can be taken down, these attackers are leveraging GitHub repositories to host malware
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Spanish law enforcement recently dismantled an advanced AI-driven phishing network and arrested the mastermind developer known as “GoogleXcoder.” This operation marks a significant victory in the fight against banking credential theft in Spain. Cybercriminals Target Banks and Government Agencies Since 2023, Spain faced a surge in sophisticated phishing campaigns. Criminal groups impersonated major banks and […]
The post Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new cybercriminal conglomerate known as Scattered Lapsus$ Hunters has emerged as a significant threat to global organizations, claiming responsibility for massive data breaches targeting Salesforce customer tenants. The group, also referred to as SP1D3R HUNTERS or SLSH, has reportedly stolen over one billion Salesforce records across two separate extortion campaigns, marking one of the […]
The post Hackers Claim Massive Salesforce Breach: 1 Billion Records Stolen appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers at Huntress have detected a widespread attack campaign targeting SonicWall SSL VPN devices across multiple customer environments, with over 100 accounts compromised since early October. The attacks appear coordinated and sophisticated, with threat actors rapidly authenticating into multiple accounts using what appears to be valid credentials rather than brute-force techniques. Cyber breach alert […]
The post SonicWall SSLVPN Targeted After Hackers Breach All Customer Firewall Backups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Oracle has issued a critical security alert for a severe vulnerability in its E-Business Suite platform that could allow attackers to execute remote code and steal sensitive data without requiring authentication. The flaw, identified as CVE-2025-61884, affects multiple versions of the widely used enterprise software and has been assigned a CVSS score of 7.5, indicating high […]
The post Oracle E-Business Suite Flaw Enables Remote Code Execution and Data Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


