Cyber Security News

Beware of Nova Stealer Malware Sold for $50 on Hacking Forums

The cybersecurity landscape faces a new challenge with the emergence of Nova Stealer, a malware marketed under the Malware-as-a-Service (MaaS) model.

Priced as low as $50 for a 30-day license, this malicious tool has gained traction among cybercriminals for its affordability and effectiveness.

Nova Stealer, a modified variant of the SnakeLogger malware, is designed to exfiltrate sensitive information from compromised systems.

The malware has been actively distributed via phishing campaigns targeting industries such as finance, retail, and IT, particularly in Russia and other regions.

How Nova Operates

Nova Stealer is typically delivered through phishing emails disguised as legitimate documents, such as contract archives.

Once executed, the malware employs sophisticated techniques to evade detection.

It utilizes steganography to conceal its payload and exploits Windows utilities like PowerShell to disable Microsoft Defender and gain persistence through the Task Scheduler.

The malware then injects its code into a suspended process using process hollowing techniques.

Upon activation, Nova Stealer harvests a wide array of data, including saved credentials from browsers and applications, keystrokes, clipboard content, and screenshots.

Retrieved data exfiltration configuration

It also targets cryptocurrency wallets and session cookies for platforms like Discord and Steam.

According to the report, the stolen data is exfiltrated via channels such as SMTP, FTP, or Telegram APIs.

A Growing Market for Cybercrime Tools

Nova Stealer’s affordability and ease of use make it accessible to a broad spectrum of threat actors.

The developers behind the malware offer additional services, such as cryptors to bypass antivirus detection, with prices ranging from $60 to $150 depending on the subscription duration.

A Telegram group created in August 2024 serves as a hub for promoting and providing technical support for the malware.

This MaaS model significantly lowers the entry barrier for cybercriminals, enabling even novice attackers to deploy sophisticated campaigns.

The availability of free keys and promotional offers further exacerbates its proliferation.

The rise of Nova Stealer highlights the persistent threat posed by information stealers in the cybercrime ecosystem.

The stolen data can be leveraged for various malicious purposes, including identity theft, financial fraud, and ransomware attacks.

Organizations are advised to implement robust email security measures to detect phishing attempts and educate employees on recognizing suspicious attachments.

Endpoint detection and response (EDR) solutions should be employed to monitor unusual system activities such as unauthorized process injections or registry modifications.

Regular updates to antivirus software and operating systems are critical to mitigating vulnerabilities exploited by such malware.

As cybercriminals continue to innovate, proactive threat intelligence remains essential in identifying emerging threats like Nova Stealer before they cause widespread damage.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations by…

11 hours ago

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the notorious…

15 hours ago

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical letters…

1 day ago

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer malware,…

1 day ago

New PyPI Malware Targets Developers to Steal Ethereum Wallets

A recent discovery by the Socket Research Team has unveiled a malicious PyPI package named…

1 day ago

Threat Actors Exploit PHP-CGI RCE Vulnerability to Attack Windows Machines

A recent cybersecurity threat has emerged where unknown attackers are exploiting a critical remote code…

1 day ago