The Strela Stealer malware, first detected in late 2022, has been actively targeting users of Microsoft Outlook and Mozilla Thunderbird email clients. It primarily spreads through phishing emails disguised as legitimate invoices, which contain a ZIP archive housing the malware loader. Once executed, the loader runs a JScript file that communicates with a command-and-control (C2) server to retrieve and launch a DLL file using the regsvr32 utility. The malware employs advanced obfuscation techniques to bypass security detection. Before executing its payload, Strela Stealer verifies the infected system's locale settings, ensuring it aligns with targeted countries such as Spain, Italy, Germany, and Ukraine. If the locale matches, the malware proceeds to extract email credentials from Outlook and Thunderbird. For Outlook, it retrieves IMAP usernames, server details, and stored passwords from the system registry. Stolen credentials, along with system data and installed software lists, are then exfiltrated via HTTP POST requests to a C2 server hosted on a Russian bulletproof hosting network. Further analysis has linked Strela Stealer’s infrastructure to Proton66 OOO, a network frequently used for cybercriminal activities. The Hive0145 threat actor behind this campaign has employed sophisticated social engineering and technical evasion tactics, making the malware highly stealthy and difficult to detect. Given the increasing complexity of phishing campaigns, individuals and organizations must take proactive measures to strengthen cybersecurity defenses. Users should remain cautious of unsolicited emails with ZIP file attachments, while businesses should implement robust security protocols, including advanced email filtering and endpoint protection, to mitigate the risk of such threats.
Security researchers have revealed a highly sophisticated Linux rootkit named Singularity, which can bypass Elastic Security’s endpoint detection and response (EDR) mechanisms. T...
The Symantec Threat Hunter Team has uncovered two major cyber intrusions targeting Ukrainian organizations, attributed to Russian-aligned threat actors. Active from late June to Au...
Attackers based in China are taking advantage of vulnerabilities in Cisco ASA, which is widely used by governments and big organizations around the world. According to Palo Alto Ne...