Cyble Reports New Stealthy Strela Stealer Bypassing Security Measures

Published:

spot_img

New Variation of Strela Stealer Uncovered by CRIL Researchers

Cyble Research and Intelligence Labs (CRIL) researchers have made a significant discovery in the world of cybersecurity, uncovering a new variation of the Strela Stealer that is causing waves in the industry. This new variant represents a notable advancement in malware delivery techniques, showcasing increased sophistication and stealth, as reported by Cyble in a recent blog post.

The latest campaign targeting Germany and Spain features versions in German, Spanish, and Basque, but experts warn that this malware could easily be repurposed for attacks in other regions, similar to what happened with the initial version of the infostealer.

The new Strela Stealer variant is using obfuscated JavaScript and base64-encoded PowerShell commands, making it extremely difficult to detect and respond to, according to Cyble. Additionally, the malware is now executing the DLL file directly from a WebDAV server without saving it to disk, further enhancing its ability to evade security measures.

This malicious software is designed to steal email configuration details and gather detailed system information, allowing attackers to conduct reconnaissance and potentially launch further targeted actions on compromised systems, Cyble explained.

The new campaign begins with a fake invoice notification and a ZIP file attachment containing obfuscated JavaScript code. This code runs through WScript, launching a base64-encoded PowerShell command that executes the final malicious DLL from a WebDAV server using “rundll32.exe” via the export function “Entry.”

By utilizing these advanced techniques, the Strela Stealer is able to avoid detection by security products and carry out its malicious activities undetected. The full Cyble blog post includes additional details, MITRE ATT&CK techniques, and around 100 Indicators of Compromise (IoCs) for cybersecurity professionals to be aware of.

spot_img

Related articles

Recent articles

Blind Eagle Deploys Proton66 Hosting for Phishing and RAT Attacks on Colombian Banks

Understanding the Cyber Threat of Blind Eagle and Its Use of Proton66 Hosting Introduction to the Threat Actor The cyber threat actor known as Blind Eagle...

Unmasking Cybercrime Masterminds with AI

Exploring Dark Web Criminal Networks: An Automated Approach Understanding Dark Web Criminal Forums The dark web continues to be a treasure trove of information for threat...

Europol Breaks Up $540 Million Crypto Fraud Ring, Arrests Five Suspects

## Europol Takes Down Major Cryptocurrency Fraud Ring ### A Significant Crackdown On a recent Monday, Europol reported a notable victory against a large cryptocurrency investment...

HPE and Veeam Unveil Global Framework for Enhanced Data Resilience

HPE and Veeam Unveil Global Framework for Modern Data Resilience Posted at 09:58h in News by Britt Jones In...