New Malware "Strela Stealer" Targets Outlook with Advanced Obfuscation Techniques
Cybersecurity firm Trustwave has recently published their analysis of a sophisticated information-stealing malware called “Strela Stealer”. This threat employs advanced obfuscation techniques to conceal its operations, making it particularly challenging for security researchers to analyze.
On March 6, 2025, Trustwave released a detailed analysis of the Strela Stealer malware. This malicious software primarily targets email account information from Mozilla Thunderbird and Microsoft Outlook, aiming to steal sensitive credentials and server details.
First observed in late 2022, Strela Stealer has been conducting highly targeted attacks against specific European nations. The primary targets include:
The malware spreads through large-scale phishing campaigns, with recent attacks impersonating legitimate company invoice emails. Instead of actual invoices, victims receive ZIP files containing the malware.
The Strela Stealer infection follows a sophisticated multi-stage process:
According to research from IBM X-Force, Strela Stealer is likely operated by a threat actor group known as “Hive0145”. The malware’s command and control (C2) servers are hosted on Russian Bulletproof hosting providers, which are known for their anonymity and resistance to legal measures.
What makes Strela Stealer particularly concerning is its sophisticated code obfuscation techniques:
These technical measures significantly complicate the detection and analysis efforts of security researchers.
Strela Stealer represents an evolving threat in the information-stealing malware category. While maintaining its focus on specific countries, the attackers continue to refine their social engineering tactics, increasingly leveraging legitimate business email formats to deceive victims.
To reduce the risk of falling victim to Strela Stealer and similar email-based cyber attacks, consider implementing these security measures:
For both organizations and individual users, maintaining awareness of emerging threats and implementing appropriate safeguards is essential in today’s cybersecurity landscape.