Cybercriminals target victims in Spain, Germany, Ukraine with Strela Stealer malware

Avatar

Cybercriminals are targeting victims throughout Europe — primarily in Spain, Germany and Ukraine — in an ongoing information-stealing campaign, researchers have found.

The financially-motivated group tracked as Hive0145 has infected targets with Strela Stealer malware delivered through phishing emails disguised as legitimate invoice notifications. 

Although the group initially relied on fake invoices and receipts sent from fabricated accounts, they recently began weaponizing stolen emails from real entities in the financial, technology, manufacturing, media, e-commerce and other sectors, according to researchers at IBM X-Force, who analyzed the latest campaigns.

Strela Stealer is designed to extract user credentials stored in Microsoft and Mozilla email services. The malware has been in use since at least 2022, targeting organizations across Europe and the U.S. Hive0145 is believed to be the tool’s sole operator.

Over the past two years, the group has experimented with various techniques to improve the Strela Stealer infection chain, and its attacks have increased in volume, researchers said. 

Hive0145 likely uses stolen credentials for email fraud, such as tricking victims into sending money or sensitive information. It is also possible that the hackers may sell stolen emails to affiliates for further business email compromise.

Despite evolving techniques, Strela Stealer has changed little in functionality over the past two years, researchers said. In addition to targeting two email clients, the malware’s latest version also collects system information, retrieves a list of installed applications and checks the victim’s keyboard language to target only those using Spanish, German, Catalan, Polish, Italian, Basque or Ukrainian.

Researchers have not attributed Hive0145 to a specific country. Ukraine’s government previously reported an increase in financially-motivated cyberattacks conducted by unidentified hacker groups associated with Russia. Like Hive0145, the hackers primarily distributed malware through phishing campaigns, often using previously compromised email addresses.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Hungary confirms hack of defense procurement agency

Next Post

Malware being delivered by mail, warns Swiss cyber agency

Related Posts

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-25012, carries a CVSS score of 9.9 out of a maximum of 10.0. It has been described as a case of prototype pollution. "Prototype pollution in Kibana leads to
Avatar
Read More

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

Austrian privacy non-profit noyb (none of your business) has sent Meta's Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users' data for training its artificial intelligence (AI) models without an explicit opt-in. The move comes weeks after the social media behemoth announced its plans to train its AI models
Avatar
Read More