NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets

NOVABLIGHT, a NodeJS-based Malware-as-a-Service (MaaS) information stealer, represents a concerning evolution in cybercrime accessibility, allowing virtually anyone to deploy advanced data theft capabilities with minimal technical expertise. This modular approach ensures that the malware remains effective against updated applications while maintaining operational flexibility for threat actors seeking specific target profiles. The malware campaign, initially discovered through fake video game installer downloads, demonstrates the growing trend of cybercriminals leveraging legitimate-seeming applications to distribute malicious payloads. Threat actors behind NOVABLIGHT have strategically positioned their product as an educational tool, despite clear evidence of its malicious intent and commercial distribution through underground marketplaces. NOVABLIGHT’s data exfiltration capabilities extend beyond simple credential theft, incorporating comprehensive system profiling, webcam recording, and targeted application injection. A sophisticated new threat has emerged in the cybercriminal landscape, masquerading as an educational tool while orchestrating large-scale credential theft and wallet compromise operations. The malware’s attack vectors primarily focus on social engineering techniques, with researchers documenting campaigns using fake video game installers as initial access vectors. The malware specifically targets Electron-based applications including Discord, Exodus wallet, and Mullvad VPN client, dynamically fetching injection payloads from [.]top/injections/ endpoints. Additionally, NOVABLIGHT implements file system modifications using the icacls command: icacls "${filePath}" /deny ${currentUser}:(DE,DC) where DE denies delete rights and DC prevents deletion through parent folder operations. The deceptive marketing approach has enabled widespread adoption among cybercriminals seeking ready-made solutions for credential harvesting and cryptocurrency theft. The group demonstrates French-language proficiency in their operational communications, conducting business primarily through Telegram and Discord platforms where they offer annual licenses and provide technical support to their criminal clientele. The malware’s architecture follows a clear pipeline structure, beginning with pre-flight checks that assess the target environment for virtual machines, debugging tools, and security software. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. Elastic analysts identified NOVABLIGHT as the latest creation of the Sordeal Group, the same threat actors responsible for Nova Sentinel and MALICORD. The persistence mechanism incorporates several advanced techniques, including registry manipulation to disable Windows security features and Task Manager access. This approach capitalizes on users’ trust in gaming platforms while delivering a comprehensive data theft payload. The malware’s clipboard monitoring functionality represents one of its most insidious capabilities, continuously scanning for cryptocurrency wallet addresses and PayPal transaction details. One notable example involved the domain [.]com, which prompted users to download what appeared to be a legitimate French-language game installer comparable to recently released Steam titles. The malware attempts to modify the registry key HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System by setting the DisableTaskMgr value to 1, effectively preventing users from easily terminating malicious processes. NOVABLIGHT employs a sophisticated multi-stage infection process designed to establish persistent access while evading detection mechanisms. This professional approach to malware distribution has transformed cybercrime from a specialized skill into a readily accessible service. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 31 Jul 2025 21:35:24 +0000


Cyber News related to NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets

NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets - NOVABLIGHT, a NodeJS-based Malware-as-a-Service (MaaS) information stealer, represents a concerning evolution in cybercrime accessibility, allowing virtually anyone to deploy advanced data theft capabilities with minimal technical expertise. This ...
5 months ago Cybersecuritynews.com
Securing Educational Robots: IoT Security in Robotics Education - As robotics continues to be integrated into educational settings, the use of educational robots powered by the Internet of Things presents exciting opportunities for enhancing learning experiences. With technological advancements come the critical ...
2 years ago Securityzap.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
2 years ago Securityzap.com
EdTech Evaluation: Choosing Secure Educational Software - The evaluation of EdTech tools for their security features is crucial in safeguarding data and maintaining a secure learning environment. An edtech security evaluation is essential to determine if the software adequately protects student and teacher ...
2 years ago Securityzap.com
Biometric Security in Educational Environments - Biometric technology has gained significant attention in recent years as a potential solution to enhance security in educational environments. The adoption of biometric security in educational settings raises important privacy and ethical concerns. ...
2 years ago Securityzap.com
Does Your App Accept Digital Wallets? - Digital wallets are electronic systems that securely store payment information digitally. Digital wallets are designed for convenience and often include security features to protect your financial data. How Digital Wallets Function Digital wallets ...
2 years ago Feeds.dzone.com
Securing Student Data in Cloud Services - In today's educational landscape, securing student data in cloud services is of utmost importance. One key aspect of securing student data in cloud services is ensuring proper data encryption. This article explores the various challenges and best ...
2 years ago Securityzap.com
Detecting Vulnerability Scanning Traffic From Underground Tools Using Machine Learning - Our structured query language (SQL) injection detection model detected triggers containing unusual patterns that did not correlate to any known open-source or commercial automated vulnerability scanning tool. We have tested all malicious payloads ...
1 year ago Unit42.paloaltonetworks.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
9 months ago Cybersecuritynews.com
10 Best Ransomware File Decryptor Tools in 2025 - Kaspersky Rakhni Decryptor contains different decryption tools based on various versions of Rakhni ransomware and helps you decrypt encrypted files on your system. PyLocky Ransomware Decryption Tool is a free and open source developed and released by ...
9 months ago Cybersecuritynews.com
Credentials are Still King: Leaked Credentials, Data Breaches and Dark Web Markets - Infostealers infect computers, steal all of the credentials saved in the browser along with active session cookies and other data, then export it back to command and control infrastructure before, in some cases, self-terminating. This article will ...
2 years ago Bleepingcomputer.com
15 PostgreSQL Monitoring Tools - 2025 - What is Good?What Could Be Better?Monitoring application performance, user experience, and errors.Some users find the pricing high, especially for larger environments.Continuous server, database, and infrastructure monitoring.The extensive feature ...
8 months ago Cybersecuritynews.com
GrassCall scam drains crypto wallets through fake web3 job interviews - A recent social engineering campaign targeted job seekers in the Web3 space with fake job interviews through a malicious "GrassCall" meeting app that installs information-stealing malware to steal cryptocurrency wallets. Users are tricked into ...
10 months ago Bleepingcomputer.com
GrassCall malware campaign drains crypto wallets via fake job interviews - A recent social engineering campaign targeted job seekers in the Web3 space with fake job interviews through a malicious "GrassCall" meeting app that installs information-stealing malware to steal cryptocurrency wallets. Users are tricked into ...
10 months ago Bleepingcomputer.com
20 Best Inventory Management Tools in 2025 - inFlow Inventory is a comprehensive inventory management tool designed for small to medium-sized businesses, offering features like real-time stock tracking, order management, and barcode scanning to streamline operations. The tool provides advanced ...
5 months ago Cybersecuritynews.com
New PyPI Malware Poses as Crypto Wallet Tools to Steal Private Keys - The cybersecurity researchers at Checkmarx uncovered a series of new supply chain attacks that exploited the Python Package Index (PyPI) in September 2024 using malicious packages to target cryptocurrency wallets. These packages identified as ...
1 year ago Hackread.com
New Powerful Nullpoint-Stealer With Extensive Capabilities Hosted on GitHub - While the repository explicitly states the project is “built as a cybersecurity lab tool” for malware analysis practice, ethical hacking labs, blue team defense testing, and “understanding how modern stealers operate,” ...
8 months ago Cybersecuritynews.com
Schools and Colleges Emerges as a Prime Target for Threat Actors - Educational institutions worldwide are facing an unprecedented wave of sophisticated cyber attacks, with the education sector ranked as the third-most targeted industry in Q2 2024, according to Microsoft. The threat actors’ attack chain begins ...
9 months ago Cybersecuritynews.com APT3
10 Best IT Asset Management Tools - 2025 - What is Good?What Could Be Better?Atera can seamlessly service and monitor Linux, Mac, and Windows systems.Sometimes, when deploying an update, patch management will fail.Using an administrator terminal, keep an eye on IT asset activity remotely.The ...
9 months ago Cybersecuritynews.com
Strategies for Securing Student Data in Cloud Services - This article addresses the strategies that educational organizations can employ to ensure the protection and confidentiality of student data in cloud services. Implementing strong access controls is crucial for ensuring the security of student data ...
2 years ago Securityzap.com
Top 10 Best Active Directory Management Tools in 2025 - SolarWinds Access Rights Manager (ARM) is a robust Active Directory management tool designed to enhance security and simplify user permissions management. Dameware Remote Everywhere (DRE) is a powerful Active Directory management tool that provides ...
9 months ago Cybersecuritynews.com
Weaponized PDF Documents Deliver Lumma InfoStealer Attacking Educational Institutions - Security analysts at Cloudsek noted that the malware employs advanced evasion techniques like obfuscated scripts and encrypted communications with Command-and-Control (C2) servers. This sophisticated campaign exploits malicious LNK (shortcut) files ...
11 months ago Cybersecuritynews.com
What are OSINT Tools - Open Source Intelligence (OSINT) tools are incredibly useful for companies, organizations, cybersecurity researchers, and students. This article will discuss the 15 best OSINT tools that can be used for investigations and educational purposes. OSINT ...
2 years ago Hackread.com
Fake Nethereum NuGet Package Used to Steal Crypto Wallets and NFTs - A recent cybersecurity incident has revealed the use of a fake Nethereum NuGet package to steal cryptocurrency wallets and NFTs from unsuspecting users. This malicious package was designed to mimic the legitimate Nethereum package, a popular .NET ...
3 months ago Thehackernews.com
Check Point Research Unfolds: Navigating the Deceptive Waters: Unmasking A Sophisticated Ongoing NFT Airdrop Scam - Sophisticated Scam Targeting Token Holders: Over 100 popular projects' token holders targeted with fake NFT airdrops appearing from reputable sources. Multi-Stage Deception Uncovered: The ongoing Scam involves enticing victims to fraudulent websites ...
2 years ago Blog.checkpoint.com