• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new strelastealer phishing attacks hit over 100 organizations in e.u.

New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.

You are here: Home / General Cyber Security News / New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.
March 22, 2024

Cybersecurity researchers have detected a new wave of phishing attacks that intention to deliver an at any time-evolving data stealer referred to as StrelaStealer.

The strategies effect extra than 100 organizations in the E.U. and the U.S., Palo Alto Networks Device 42 scientists stated in a new report published today.

“These strategies arrive in the variety of spam e-mail with attachments that ultimately launch the StrelaStealer’s DLL payload,” the organization reported in a report posted nowadays.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“In an attempt to evade detection, attackers transform the first email attachment file structure from one particular campaign to the future, to stop detection from the previously produced signature or designs.”

Initial disclosed in November 2022, StrelaStealer is equipped to siphon email login knowledge from well-identified email consumers and exfiltrate them to an attacker-controlled server.

Considering the fact that then, two substantial-scale campaigns involving the malware have been detected in November 2023 and January 2024 targeting significant tech, finance, specialist and authorized, producing, authorities, electricity, insurance policy, and development sectors in the E.U. and the U.S.

Cybersecurity

These attacks also goal to supply a new variant of the stealer that packs in better obfuscation and anti-investigation techniques, although remaining propagated by way of bill-themed emails bearing ZIP attachments, marking a change from ISO files.

Present within the ZIP archives is a JavaScript file that drops a batch file, which, in convert, launches the stealer DLL payload utilizing rundll32.exe, a legit Windows element responsible for jogging 32-bit dynamic-connection libraries.

The stealer malware also depends on a bag of obfuscation tricks to render examination tricky in sandboxed environments.

“With every single new wave of email strategies, threat actors update the two the email attachment, which initiates the infection chain, and the DLL payload by itself,” the scientists said.

The disclosure comes as Broadcom-owned Symantec uncovered that phony installers for nicely recognised applications or cracked program hosted on GitHub, Mega or Dropbox are serving as a conduit for a stealer malware known as Stealc.

Phishing campaigns have also been noticed providing Revenge RAT and Remcos RAT (aka Rescoms), with the latter sent by implies of a cryptors-as-a-company (CaaS) named AceCryptor, per ESET.

StrelaStealer Phishing Attack

“All through the 2nd half of [2023], Rescoms grew to become the most commonplace malware loved ones packed by AceCryptor,” the cybersecurity business mentioned, citing telemetry info. “Around fifty percent of these makes an attempt occurred in Poland, followed by Serbia, Spain, Bulgaria, and Slovakia.”

Other well known off-the-shelf malware packed inside AceCryptor in H2 2023 include things like SmokeLoader, Halt ransomware, RanumBot, Vidar, RedLine, Tofsee, Fareit, Pitou, and Stealc. It is really truly worth noting that a lot of of these malware strains have also been disseminated by way of PrivateLoader.

One more social engineering scam noticed by Secureworks Counter Menace Device (CTU) has been identified to goal people today seeking information and facts about just lately deceased people today on look for engines with bogus obituary notices hosted on bogus websites, driving site visitors to the websites as a result of search engine optimization (Search engine optimisation) poisoning in order to eventually press adware and other undesired plans.

“Visitors to these sites are redirected to e-relationship or adult amusement web-sites or are quickly presented with CAPTCHA prompts that set up web force notifications or popup adverts when clicked,” the firm claimed.

Cybersecurity

“The notifications display bogus virus notify warnings from nicely-identified antivirus apps like McAfee and Windows Defender, and they persist in the browser even if the victim clicks just one of the buttons.”

“The buttons hyperlink to reputable landing webpages for subscription-dependent antivirus program programs, and an affiliate ID embedded in the hyperlink benefits threat actors for new subscriptions or renewals.”

Whilst the exercise is presently limited to filling fraudsters’ coffers by using affiliate applications, the attack chains could be simply repurposed to deliver information stealers and other destructive courses.

The improvement also follows the discovery a new activity cluster tracked as Fluffy Wolf that’s capitalizing on phishing e-mail that contains an executable attachment to produce a cocktail of threats, this sort of as MetaStealer, Warzone RAT, XMRig miner, and a authentic remote desktop tool called Remote Utilities.

The campaign is a indication that even unskilled danger actors can leverage malware-as-a-provider (MaaS) techniques to carry out thriving attacks at scale and plunder sensitive information, which can then be monetized further more for earnings.

“Though mediocre in conditions of specialized expertise, these danger actors realize their ambitions by utilizing just two sets of applications: genuine remote accessibility products and services and cheap malware,” BI.ZONE said.

Discovered this write-up attention-grabbing? Stick to us on Twitter  and LinkedIn to read through extra special information we publish.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «aws patches critical 'flowfixation' bug in airflow service to prevent AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
Next Post: Russian Hackers Use ‘WINELOADER’ Malware to Target German Political Parties russian hackers use 'wineloader' malware to target german political parties»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.