The Noodlophile Stealer malware campaign has evolved into a sophisticated global cyber threat, leveraging social engineering, obfuscation techniques, and Telegram-based command-and-control (C2). Initially limited in scope, it now aggressively targets enterprises across the United States, Europe, the Baltics, and Asia-Pacific (APAC). By posing as fake copyright infringement notices, attackers manipulate victims into clicking malicious Dropbox links or opening disguised files.
This malware campaign uses AI-powered localization and multilingual spear-phishing lures to scale its attacks. Industries and enterprises with visible social media footprints are at highest risk, particularly those managing Facebook Pages and other online assets.
Attackers distribute phishing emails impersonating Facebook copyright violation warnings. Victims are tricked into opening malicious attachments or Dropbox-hosted payloads, disguised as .docx or .png files. By exploiting DLL side-loading vulnerabilities in legitimate applications like Haihaisoft PDF Reader and Excel converters, attackers stealthily inject malware into systems.
The execution phase relies on recursive stub loading and BAT/Python scripts for persistence. Registry modifications ensure the malware survives reboots, while obfuscated scripts escalate evasion. Hosting payloads on free file-sharing platforms adds resilience against takedowns.
At its core, the Noodlophile Stealer aggressively harvests:
Credentials and passwords from web browsers
Cookies and credit card data
System metadata and security configurations
Stored authentication tokens
To evade detection, it sometimes deploys .NET executables to disable monitoring, uses self-deletion routines, and hides forensic traces.
The malware leverages Telegram-based C2 channels for encrypted communications, making detection harder. This infrastructure strengthens its resilience, stealth, and adaptability.
Be wary of copyright claim emails – Verify through official channels, not Gmail accounts.
Scan all shared attachments and Dropbox links before opening.
Harden browser defenses – Encourage password managers and enforce MFA.
Deploy advanced EDR/NGAV solutions with behavioral and machine-learning detection.
The campaign maps to multiple MITRE ATT&CK TTPs, including:
Phishing & Spearphishing (T1566, T1566.001, T1566.002)
User Execution of Malicious Files (T1204, T1204.002)
DLL Hijacking & Execution Flow Hijacking (T1574, T1574.001)
Credential Access (T1555, T1555.003)
Data Exfiltration via Web Services (T1567)
Command and Scripting Interpreter (T1059, T1059.006)
Obfuscation and Defense Evasion (T1027, T1070)
Full list of mapped TTPs is available in the report.
The campaign uses Dropbox links, TinyURL, T2M shorteners, Pastebin references, and Telegram channels to deliver malware and exfiltrate data. Multiple SHA256 hashes of payloads have been tracked, enabling defenders to strengthen detection rules.
1. Morphisec – Noodlophile Stealer Evolves with Targeted Copyright Phishing
Get through updates and upcoming events, and more directly in your inbox