Back

NWHStealer Malware Campaign Evolves with Bun Loader and Anti-VM Techniques

Severity: High (Score: 69.5)

Sources: Gbhackers, Cybersecuritynews

Summary

The NWHStealer infostealer has adopted a new distribution method utilizing the Bun JavaScript runtime, enhancing its delivery infrastructure. This Rust-based malware targets Windows systems, leveraging Bun's performance to package malicious code effectively. The threat actors are employing anti-VM checks to evade detection and analysis, indicating a sophisticated approach to malware deployment. The campaign signifies a shift in tactics, as attackers experiment with emerging technologies to bypass traditional security measures. The full scope of the impact is still being assessed, but the use of encrypted command and control (C2) channels raises concerns about data exfiltration. Cybersecurity researchers are actively monitoring the situation as it develops. Key Points: • NWHStealer now uses the Bun JavaScript runtime for enhanced malware delivery. • Attackers employ anti-VM evasion techniques to avoid detection. • The campaign utilizes encrypted C2 channels, complicating threat mitigation.

Key Entities

  • Malware (attack_type)
  • NWHStealer Campaign (campaign)
  • NWHStealer (malware)
  • T1071 - Application Layer Protocol (mitre_attack)
  • T1497 - Virtualization/Sandbox Evasion (mitre_attack)
  • Windows (platform)
  • Bun (tool)
  • Bun Loader (tool)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed