📬 Detour Dog und die DNS-TXT-Kommunikation – eine neue Dimension der Malware-Verteilung
#Cyberangriffe #ITSicherheit #DetourDog #HelpTDS #PoisonedDNS #StarFish #StrelaStealer #TXTRecordAbfrage #VexTrioViper https://sc.tarnkappe.info/1b20a1
Detour Dog und die DNS-TXT-Kommunikation – eine neue Dimension der Malware-Verteilung

Die Malware-Kampagne von Detour Dog ist schon lange aktiv. In Wordpress-Blogs bettete man dafür ein ausgeklügeltes JavaScript ein.

TARNKAPPE.INFO

We recently unraveled a mystery involving ~30k infected websites, DNS TXT records, and Strela Stealer #malware distribution. A threat actor who has been around since at least Feb 2020 has evolved to distribute malware through misdirection and a complex relay system, leaving defenders unsure where the actual malware is hosted.
And to top it off, we found that part of the campaigns were sent via REM proxy, another threat actor we track via DNS that leverages compromised MikroTik routers. These campaigns were spam messages targeting #german speakers with malicious .svg files.
The attachments had links pointing to the first stage of the malware -- or did it? It turns out the threat actor, which we track as Detour Dog, is playing mind games. That link actually triggers server-side DNS queries and the fun begins.
Here is the paper: https://blogs.infoblox.com/threat-intelligence/detour-dog-dns-malware-powers-strela-stealer-campaigns/
More nuggets in the replies.

#malware #infostealer #dns #threatintel #cybersecurity #cybercrime #scam #helptds #tds #infosec #infoblox #strelastealer #phishing #spam #remproxy

Detour Dog: DNS Malware Powers Strela Stealer Campaigns

30k sites infected with DNS malware by Detour Dog. Now linked to Strela Stealer, StarFish backdoor, REM Proxy, and Tofsee in global spam campaigns.

Infoblox Blog

🚨 Your inbox's invisible enemy: Sophisticated "Strela Stealer" malware is targeting European email users through fake invoices, using advanced techniques to steal Outlook and Thunderbird credentials. Learn how this threat operates and what you can do to protect your sensitive information.

#SecurityLand #CyberSecurity #EmailSecurity #Trustwave #StrelaStealer #Malware #Europe

https://www.security.land/new-malware-strela-stealer-targets-outlook-with-advanced-obfuscation-techniques/

New Malware "Strela Stealer" Targets Outlook with Advanced Obfuscation Techniques | Security Land

Trustwave uncovers Strela Stealer malware targeting Outlook and Thunderbird users in Europe with sophisticated obfuscation method.

Security Land
Palo Alto Networks Unit 42 on LinkedIn: #strelastealer #malspam #webdav

2025-02-10 (Monday): #StrelaStealer distributed through #malspam targeting EU. Zip attachment contains .js file that retrieves and displays decoy PDF before running StrelaStealer DLL hosted on #WebDAV server. More info at https://bit.ly/3QgxaLr

Stealthy Strela Stealer Detection: Info-Stealing Malware Resurfaces with Enhanced Capabilities to Target Central and Southwestern Europe
#StrelaStealer
https://socprime.com/blog/stealthy-strela-stealer-detection/
Stealthy Strela Stealer Detection: Info-Stealing Malware Resurfaces with Enhanced Capabilities to Target Central and Southwestern Europe - SOC Prime

Detect Strela Stealer malware, which uses obfuscated JavaScript and PowerShell commands to evade detection, with Sigma rules from SOC Prime Platform.

SOC Prime

🕵️‍♂️ Phishing attacks are getting smarter! Strela Stealer targets users in Europe, bypassing security with advanced PowerShell obfuscation and region-specific tactics.

🛡️ Pro Tip: Never open attachments from unknown senders—especially ZIP files disguised as invoices. Phishing simulations can help boost your resilience!

📢 How vigilant are you about verifying unexpected attachments? Share your thoughts!

Read more on how to defend against threats like Strela Stealer: https://guardiansofcyber.com/cybersecurity-news/strela-stealer-powershell-bypass-security-eu/

#Cybersecurity #GuardiansOfCyber #Phishing #DataProtection #StrelaStealer #PhishingAwareness #SecurityTips #OnlineSafety #StaySafe #Guardians

Angriffe auf Deutschland: Malware meidet Infektion russischer Systeme - Golem.de

Die Malware Strelastealer greift Zugangsdaten aus Outlook und Thunderbird ab. Ziele sind Nutzer aus Deutschland und drei anderen EU-Ländern, nicht aber aus Russland.

Golem.de
Angriffe auf Deutschland: Malware meidet Infektion russischer Systeme - Golem.de

Die Malware Strelastealer greift Zugangsdaten aus Outlook und Thunderbird ab. Ziele sind Nutzer aus Deutschland und drei anderen EU-Ländern, nicht aber aus Russland.

Golem.de

Resurgent malware targets Outlook and Thunderbird users but bypasses Russia⤵️
#malware #cybersecurity #StrelaStealer #infosec

https://cnews.link/malware-targets-outlook-thunderbird/

Campagne #Malware #Italy Week 25

☠️💣🔥👻
#Formbook: Pagamento
#AgentTesla: Ordine
#DanaBot: AgenziaEntrate
#KoiLoader - #KoiStealer: Resend
#StrelaStealer: Pagamenti
#Neshta: Ordini

#mwitaly