NOVABLIGHT Masquerades as Educational Tool to Steal Login Credentials and Compromise Crypto Wallets

NOVABLIGHT Masquerades as Educational Tool to Steal Login Credentials and Compromise Crypto Wallets

A newly analyzed Malware-as-a-Service (MaaS) infostealer, NOVABLIGHT, has emerged as a significant cybersecurity threat, targeting unsuspecting users with advanced data theft capabilities.

Developed and sold by the Sordeal Group, a threat actor demonstrating French-language proficiency, NOVABLIGHT is marketed as an “educational tool” on platforms like Telegram and Discord.

However, in-depth analysis by Elastic Security Labs reveals its true intent: a modular, feature-rich NodeJS-based malware built on the Electron framework, designed to steal sensitive information, including login credentials and cryptocurrency wallet data.

The group’s communications and operational tactics, often unredacted on their primary sales channels, expose their malicious objectives, contradicting their educational claims.

Advanced Evasion Tactics

NOVABLIGHT is distributed through deceptive campaigns, often leveraging fake video game installers as initial access lures.

NOVABLIGHT’s product page on Billgang

One such example involves a malicious URL prompting users to download a French-language game installer mimicking a recent Steam release.

Once executed, the malware deploys a multi-stage pipeline from pre-flight checks and anti-analysis measures to data harvesting and exfiltration.

Its capabilities include sandbox detection, system sabotage, and heavy obfuscation techniques like array mapping, base91 string encoding, and control flow obfuscation, making detection and analysis challenging.

NOVABLIGHT also targets popular Electron-based applications like Discord, Exodus, and Atomic wallets, injecting malicious code to exfiltrate credentials via configurable Discord webhooks and Telegram APIs.

Additionally, it employs clipboard hijacking to substitute cryptocurrency addresses, potentially redirecting funds to attackers, and downloads tools to decrypt data from Chromium-based browsers.

Persistent Evolution

The Sordeal Group monetizes NOVABLIGHT through a subscription model, offering API keys with validity ranging from 1 to 12 months, which users can utilize to build malware instances via Telegram bots or Discord channels.

Crypto Wallets
Landing page for http://gonefishe . com

The group promotes a referral program and provides access to a dashboard hosted on domains like api.nova-blight[.]top and shadow.nova-blight[.]top for managing stolen data.

Despite its supposed educational purpose, community interactions on Telegram reveal users sharing screenshots of luxury purchases and money transfers, highlighting the malware’s real-world impact.

NOVABLIGHT’s infrastructure is notably resilient, utilizing a mix of third-party file-hosting services and dedicated backend servers for data exfiltration, ensuring operational continuity even if primary channels are disrupted.

Elastic Security Labs notes that the malware is under active development, with ongoing updates ensuring its persistence as a relevant threat.

Its alignment with MITRE ATT&CK tactics spanning execution, persistence, defense evasion, credential access, and exfiltration underscores its sophistication and the need for robust detection mechanisms, such as the YARA rules developed by Elastic to identify this activity.

Indicators of Compromise (IOC)

Observable Type Name/Reference
ed164ee2eacad0eea9dc4fbe271ee2b2387b59929d73c843281a8d5e94c05d64 SHA-256 NOVABLIGHT VERSION 2.2
39f09771d70e96c7b760b3b6a30a015ec5fb6a9dd5bc1e2e609ddf073c2c853d SHA-256 NOVABLIGHT VERSION 2.1
97393c27195c58f8e4acc9312a4c36818fe78f2ddce7ccba47f77a5ca42eab65 SHA-256 NOVABLIGHT VERSION 2.0
api.nova-blight[.]top DOMAIN NOVABLIGHT dashboard
shadow.nova-blight[.]top DOMAIN NOVABLIGHT dashboard
nova-blight[.]site DOMAIN NOVABLIGHT dashboard
nova-blight[.]xyz DOMAIN NOVABLIGHT dashboard
bamboulacity.nova-blight[.]xyz DOMAIN NOVABLIGHT dashboard

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!


Source link