Over 100 US and EU orgs targeted in StrelaStealer malware attacks

By Bill Toulas, Bleeping Computer

A new large-scale StrelaStealer malware campaign has impacted over a hundred organizations across the United States and Europe, attempting to steal email account credentials.

StrelaStealer was first documented in November 2022 as a new information-stealing malware that steals email account credentials from Outlook and Thunderbird.

One notable characteristic of the malware was using a polyglot file infection method to evade detection from security software.

At the time, StrelaStealer was seen targeting predominately Spanish-speaking users. However, according to a recent report by Palo Alto Networks' Unit42, this has changed as the malware now targets people from the U.S. and Europe.

StrelaStealer is distributed through phishing campaigns that showed a significant uptick in November 2023, some days targeting over 250 organizations in the U.S.

The elevated phishing email distribution volumes continued into 2024, with a significant wave of activity being recorded by Unit42 analysts between late January and early February 2024.

In some days during that period, the attacks in the U.S. surpassed 500, while Unit42 says it has confirmed at least 100 compromises in the country as well as Europe.

The malware operators used English and other European languages to adjust their attacks as needed.

Most targeted entities operate in the 'high tech' space, followed by sectors like finance, legal services, manufacturing, government, utilities and energy, insurance, and construction.


Comments

Popular posts from this blog

New MFA-bypassing phishing kit targets Microsoft 365, Gmail accounts

Ransomware gang starts leaking alleged stolen Change Healthcare data

Why remote desktop tools are facing an onslaught of cyber threats