A large-scale campaign targeting Russian organizations across various industries has been detected. The attackers are using NOVA stealer, a commercial fork of SnakeLogger, distributed via phishing emails disguised as contract archives. NOVA, marketed as Malware-as-a-Service, is capable of stealing credentials, capturing keystrokes, taking screenshots, and extracting clipboard data. The malware gains persistence through Windows Task Scheduler and injects itself into a spawned child process. Data exfiltration is performed via SMTP. The campaign highlights the growing threat of stealers and the potential for harvested data to be used in future targeted attacks. Author: AlienVault
Related Tags:
organizations
SUPERNOVA – S0578
T1071.003
T1027.003
T1564.004
russian
SnakeLogger
data exfiltration
T1056.001
Associated Indicators:
15DE4683CF8BED4D31660BDD69DCA14EC4B71353
831582068560462536DAAEEF1EFF8353