HomeSecurity OperationsWarning: Nova Stealer Malware Available for Purchase at $50 on Hacking Forums

Warning: Nova Stealer Malware Available for Purchase at $50 on Hacking Forums

Published on

spot_img

The cybersecurity world is grappling with a new adversary in the form of Nova Stealer, a malware that has emerged in the underground market under the lucrative Malware-as-a-Service (MaaS) model. Priced affordably at just $50 for a 30-day license, Nova Stealer has quickly gained popularity among cybercriminals due to its effectiveness and accessibility.

Originally based on the SnakeLogger malware, Nova Stealer is specifically engineered to extract sensitive data from compromised systems. This malicious software has been predominantly spread through phishing campaigns, with a focus on industries such as finance, retail, and IT, particularly in regions like Russia.

The operation of Nova Stealer is quite sophisticated and deceptive. It is usually disseminated through phishing emails disguised as legitimate documents, like contract archives, to trick unsuspecting victims into activating it. Once launched, the malware deploys advanced techniques to avoid detection. It leverages steganography to hide its payload and exploits various Windows utilities like PowerShell to disable Microsoft Defender and establish persistence through the Task Scheduler. Additionally, Nova Stealer injects its code into a suspended process using process hollowing methods.

Upon activation, Nova Stealer scours the compromised system for a wide range of data, including stored credentials from browsers and applications, keystrokes, clipboard contents, and screenshoots. It also targets cryptocurrency wallets and session cookies for platforms like Discord and Steam. Stolen data is then sent out through channels such as SMTP, FTP, or Telegram APIs, as revealed in a recent report.

The affordability and ease of use of Nova Stealer have made it a popular choice among a wide spectrum of threat actors. The developers behind the malware even offer additional services, such as cryptors to evade antivirus detection, ranging from $60 to $150 based on the subscription duration. A Telegram group established in August 2024 functions as a central hub for the promotion and technical support of Nova Stealer.

This Malware-as-a-Service model significantly reduces the barriers to entry for cybercriminals, allowing even novice attackers to execute sophisticated campaigns. Free keys and promotional offers further contribute to its widespread adoption. The increasing prevalence of Nova Stealer underscores the persistent threat posed by data-stealing malware in the cybercrime landscape.

Stolen data can be exploited for various nefarious purposes, including identity theft, financial scams, and ransomware assaults. To combat such threats, organizations are encouraged to implement robust email security measures to identify phishing attempts and educate employees on spotting suspicious attachments. Endpoint detection and response (EDR) solutions should be employed to monitor unusual system behaviors, such as unauthorized process injections or registry modifications. Timely updates to antivirus software and operating systems are crucial in addressing vulnerabilities exploited by malware like Nova Stealer.

As cybercriminals continue to evolve their tactics, staying ahead with proactive threat intelligence is essential in detecting emerging threats like Nova Stealer before they wreak havoc on a large scale. The ongoing battle against cyber threats necessitates constant vigilance, readiness, and a proactive approach to cybersecurity.

Source link

Latest articles

BCA: The Customer Data Reportedly Obtained by Bjorka Hacker Group is False

Indonesian banking giant Bank Central Asia, commonly known as BCA, has recently faced a...

Simplifying Risk Management for Small Enterprises: A Step-by-Step Guide to the NIST Risk Management Framework

Ransomware attacks continue to be a major concern as the decade approaches its halfway...

Europol Takes Action Against International Child Abuse Network Known as “The Com”

Authorities around the world have successfully arrested two key leaders of an extremist online...

Researcher Successfully Outsmarts and Jailbreaks OpenAI’s New o3-mini

OpenAI's latest o3-mini model, released to the public just days ago, has already come...

More like this

BCA: The Customer Data Reportedly Obtained by Bjorka Hacker Group is False

Indonesian banking giant Bank Central Asia, commonly known as BCA, has recently faced a...

Simplifying Risk Management for Small Enterprises: A Step-by-Step Guide to the NIST Risk Management Framework

Ransomware attacks continue to be a major concern as the decade approaches its halfway...

Europol Takes Action Against International Child Abuse Network Known as “The Com”

Authorities around the world have successfully arrested two key leaders of an extremist online...