Executive Summary
In November 2025, cybersecurity researchers uncovered a sophisticated supply chain attack involving malicious npm packages—'bitcoin-main-lib', 'bitcoin-lib-js', and 'bip40'—that distributed the remote access trojan NodeCordRAT. Uploaded by the threat actor 'wenmoonx', these packages mimicked legitimate BitcoinJS repositories, leveraging npm’s postinstall scripts to deliver malware hidden in 'bip40'. NodeCordRAT enabled attackers to exfiltrate Chrome credentials, cryptocurrency wallet seed phrases, and sensitive files to Discord-controlled servers, using Discord’s API for covert communication and command execution. This multi-OS campaign potentially impacted thousands of developers before takedown.
The incident stands out for its abuse of trusted open-source components, increasing concern across the software supply chain. Its methodology highlights the growing sophistication of attacker tradecraft leveraging developer ecosystems and API-based covert channels, making such threats relevant for all organizations relying on open-source dependencies.
Why This Matters Now
Supply chain attacks via trusted code registries are rising, exposing organizations to stealthy malware well before detection. With attackers impersonating popular packages and integrating data exfiltration via mainstream APIs like Discord, there is urgent need for enhanced code vetting, zero trust principles, and continuous threat monitoring in software development and deployment pipelines.
Attack Path Analysis
Attackers leveraged malicious npm packages posing as legitimate Bitcoin libraries to achieve initial compromise via supply chain. Upon installation, postinstall scripts deployed NodeCordRAT, granting attacker presence and potential local privilege escalation. While explicit lateral movement is not detailed, compromised hosts could be pivoted to access additional resources. NodeCordRAT established persistent command and control through Discord, listening for instructions. Sensitive data such as credentials, wallet seed phrases, and screenshots were exfiltrated through Discord API channels. The attack's impact lay primarily in credential theft, potential cryptocurrency loss, and the risk of further compromise.
Kill Chain Progression
Initial Compromise
Description
Malicious npm packages with embedded postinstall scripts were used in a supply chain attack, leading to installation of NodeCordRAT on developer or user environments.
MITRE ATT&CK® Techniques
Supply Chain Compromise: Compromise Software Supply Chain
Command and Scripting Interpreter: JavaScript/Node.js
Input Capture: Keylogging
Screen Capture
Exfiltration Over C2 Channel
Application Layer Protocol: Web Protocols
Exfiltration Over Web Service: Exfiltration to Cloud Storage
File and Directory Discovery
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure Only Trusted Applications Are Installed
Control ID: 6.2.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Digital Operational Resilience Act) – Managing ICT Third-Party Risk
Control ID: Article 6(9)
NIS2 Directive – Supply Chain Security
Control ID: Article 21(2)(d)
CISA Zero Trust Maturity Model 2.0 – Software Supply Chain Security
Control ID: Supply Chain Pillar
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Supply chain attacks via malicious npm packages directly threaten software development pipelines, requiring enhanced package validation and zero trust segmentation controls.
Financial Services
NodeCordRAT's cryptocurrency wallet credential theft and API token stealing capabilities pose severe risks to financial institutions' digital asset operations.
Cryptocurrencies
Bitcoin-themed malicious packages specifically target MetaMask seed phrases and crypto credentials, exploiting developer trust in legitimate-sounding cryptocurrency development libraries.
Information Technology/IT
Remote access trojan capabilities enable lateral movement and data exfiltration across IT infrastructure, demanding multicloud visibility and threat detection controls.
Sources
- Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packageshttps://thehackernews.com/2026/01/researchers-uncover-nodecordrat-hidden.htmlVerified
- Malicious NPM Packages Deliver NodeCordRAThttps://www.zscaler.com/blogs/security-research/malicious-npm-packages-deliver-nodecordratVerified
- Widespread Supply Chain Compromise Impacting npm Ecosystemhttps://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystemVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, egress policy enforcement, and threat detection controls would have constrained the NodeCordRAT kill chain by restricting lateral movement, detecting malicious C2 traffic, and blocking sensitive data exfiltration over Discord APIs. Centralized visibility and real-time inspection could have surfaced anomalous behaviors for rapid incident response.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: Enhanced visibility and detection of package-based threats at install.
Control: Zero Trust Segmentation
Mitigation: Limited attack scope via microsegmentation and least privilege workload policies.
Control: East-West Traffic Security
Mitigation: Blocked or alerted on unauthorized internal movement.
Control: Egress Security & Policy Enforcement
Mitigation: Disrupted C2 by restricting unauthorized outbound connections.
Control: Egress Security & Policy Enforcement
Mitigation: Prevented or alerted on data exfiltration attempts via inbound/outbound policy and DLP.
Accelerated detection and containment to minimize impact.
Impact at a Glance
Affected Business Functions
- Software Development
- IT Security
- Cryptocurrency Transactions
Estimated downtime: 5 days
Estimated loss: $500,000
Potential exposure of sensitive information including Google Chrome credentials, API tokens, and cryptocurrency wallet seed phrases. The malware's data exfiltration capabilities could lead to unauthorized access to critical systems and financial assets.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Zero Trust segmentation and namespace isolation to restrict RAT movement and minimize blast radius.
- • Implement strict egress filtering on workloads to block unauthorized outbound channels such as Discord APIs.
- • Continuously monitor and baseline east-west traffic for anomalous behaviors indicative of supply chain malware.
- • Leverage centralized visibility and real-time inspection to rapidly detect and respond to new malicious package installations.
- • Incorporate microsegmentation and workload identity-based policies to ensure least privilege access in developer and CI/CD environments.



