New year, new stealer: January starts with a large‑scale campaign targeting Russian companies
In January 2025, the BI.ZONE team recorded multiple attacks targeting Russian organizations across various industries, including finance, retail, IT, government, transportation, and logistics.
The threat actors have employed NOVA stealer, a commercial modification of SnakeLogger, to retrieve credentials, which are subsequently sold on underground websites.
The stealer is disguised as a contract archive and distributed via phishing emails. The attackers generally employ double file extensions and familiar icons, such as those of Word or PDF files. As a result, victims may not realize that the file they open is, in fact, an executable.
The NOVA attachment, however, is not disguised with anything more than a plausible file name, such as Договор.exe
. Instead of sophisticated masquerading techniques, threat actors rely on mass mailings and less attentive employees who routinely manage high volumes of emails.
Once unpacked and injected into a system, the stealer retrieves saved credentials, captures keystrokes, takes screenshots, and extracts clipboard data.
The NOVA stealer has been marketed on Telegram since August 2024, priced at $50 for a 30‑day license or $630 for a lifetime license. The developer also offers a cryptor designed to prevent malware detection, with its price ranging from $60 for a 30‑day license up to $150 for a 90‑day license.
Cyber threat intelligence portals can be leveraged to monitor compromised corporate accounts on underground websites. For instance, the BI.ZONE Threat Intelligence portal can provide data on compromised accounts by a specific email address, an email domain, or a particular URL.