Greg Otto@CyberScoop - 76d
References :
Classification:
@securityonline.info - 27d
Cybersecurity experts are warning of a widespread campaign involving Nova Stealer, a variant of SnakeLogger malware, now being sold as Malware-as-a-Service (MaaS) on underground forums. Priced as low as $50 for a 30-day license, Nova Stealer is designed to steal sensitive information, including credentials, keystrokes, screenshots, and clipboard data, making it an attractive tool for cybercriminals. This affordability and ease of deployment significantly lower the barrier for entry, enabling even novice attackers to launch sophisticated cyberattacks, especially targeting industries such as finance, retail, and IT.
The malware is often distributed through phishing emails disguised as legitimate documents. Once executed, Nova Stealer employs sophisticated techniques to evade detection, including steganography and process hollowing, while exploiting Windows utilities like PowerShell to disable Microsoft Defender. Stolen data is exfiltrated via channels such as SMTP, FTP, or Telegram APIs, and can be leveraged for identity theft, financial fraud, and ransomware attacks. The rise of Nova Stealer highlights the persistent threat posed by information stealers in the cybercrime ecosystem. References :
Classification:
@www.malwarebytes.com - 67d
Lumma, an advanced information stealer, has become a dominant force in the cybercrime landscape throughout 2024. Marketed as Malware-as-a-Service (MaaS), it is readily available on Russian-speaking forums and Telegram channels. This malware targets Windows systems, aiming to exfiltrate credentials, cryptocurrency wallet data, browser information, and two-factor authentication details. Lumma employs sophisticated methods such as binary morphing and server-side data decryption to avoid detection. It operates on a subscription basis, with tiered plans offering features such as customizable log management, data filtering, and advanced stealth capabilities, making it accessible to both novice and experienced cybercriminals.
Lumma’s capabilities are extensive and include data exfiltration, regular updates, and the ability to collect detailed data logs, as well as the capability to download additional malware to compromised systems. It has been observed in multiple campaigns that use techniques like phishing, malvertising, and fake software updates. These campaigns have targeted a diverse range of sectors including manufacturing, transportation, and individuals such as gamers, users of cracked software, and cryptocurrency enthusiasts. The developers of Lumma have implemented policies to avoid targeting Russia, further demonstrating the malware's reach beyond Russian-speaking regions. References :
Classification:
|