New NWHStealer Campaign Uses Bun Loader to Evade Detectio
When Modern Development Tools Become Malware Delivery Systems: Inside the NWHStealer Bun Loader Campaign As an independent cybersecurity blogger and part time penetration tester, one of the most interesting evolutions in modern malware campaigns is not the payload itself. It is the infrastructure around it. Threat actors are no longer relying only on traditional loaders and commodity droppers. Instead, they are increasingly abusing: Modern developer tooling JavaScript runtimes Open source ecosystems Legitimate software frameworks The latest campaign involving NWHStealer and the Bun JavaScript runtime demonstrates exactly how attackers are modernizing malware delivery to evade detection and improve operational flexibility. What Happened: Researchers Identify New NWHStealer Delivery Chain Researchers uncovered a new malware campaign where attackers used the Bun JavaScript runtime as part of a sophisticated delivery chain for the Windows based infostealer known as NWHStealer ....