Cyble Reports New Stealthy Strela Stealer Bypassing Security Measures

Published:

spot_img

New Variation of Strela Stealer Uncovered by CRIL Researchers

Cyble Research and Intelligence Labs (CRIL) researchers have made a significant discovery in the world of cybersecurity, uncovering a new variation of the Strela Stealer that is causing waves in the industry. This new variant represents a notable advancement in malware delivery techniques, showcasing increased sophistication and stealth, as reported by Cyble in a recent blog post.

The latest campaign targeting Germany and Spain features versions in German, Spanish, and Basque, but experts warn that this malware could easily be repurposed for attacks in other regions, similar to what happened with the initial version of the infostealer.

The new Strela Stealer variant is using obfuscated JavaScript and base64-encoded PowerShell commands, making it extremely difficult to detect and respond to, according to Cyble. Additionally, the malware is now executing the DLL file directly from a WebDAV server without saving it to disk, further enhancing its ability to evade security measures.

This malicious software is designed to steal email configuration details and gather detailed system information, allowing attackers to conduct reconnaissance and potentially launch further targeted actions on compromised systems, Cyble explained.

The new campaign begins with a fake invoice notification and a ZIP file attachment containing obfuscated JavaScript code. This code runs through WScript, launching a base64-encoded PowerShell command that executes the final malicious DLL from a WebDAV server using “rundll32.exe” via the export function “Entry.”

By utilizing these advanced techniques, the Strela Stealer is able to avoid detection by security products and carry out its malicious activities undetected. The full Cyble blog post includes additional details, MITRE ATT&CK techniques, and around 100 Indicators of Compromise (IoCs) for cybersecurity professionals to be aware of.

spot_img

Related articles

Recent articles

Malaysia and UAE Forge Innovative AI Partnership to Strengthen Digital Collaboration

Accelerating Digital Transformation: Malaysia's Bold AI Partnership with UAE In an age where artificial intelligence (AI) has reshaped industries and redefined possibilities, Malaysia is poised...

Exposing DMCA Abuse: Soft2Bet and Uri Poliavich’s Dark Web Missteps

Exposing DMCA Abuse: The Case Against Soft2Bet Understanding the Situation Recent events have brought Soft2Bet and its CEO, Uri Poliavich, under scrutiny for alleged misuse of...

Unveiling Cyber Threats: APT Intrusions, AI Malware, Zero-Click Exploits, and Browser Hijacks

Jun 02, 2025Ravie LakshmananCybersecurity / Hacking News Imagine a security drill that spirals out of control—it would raise alarms, but in today’s cyber landscape, this...

Kuwait Set for Significant Borrowing Between 2025 and 2028

Kuwait's Growing Fiscal Challenges and Borrowing Needs Kuwait is anticipated to emerge as a significant borrower within the region in the coming years, primarily due...