Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

Posted on October 18, 2025October 18, 2025 By CWS

Oct 18, 2025Ravie LakshmananThreat Intelligence / Cybercrime
Cybersecurity researchers have make clear a brand new marketing campaign that has doubtless focused the Russian car and e-commerce sectors with a beforehand undocumented .NET malware dubbed CAPI Backdoor.
In accordance with Seqrite Labs, the assault chain includes distributing phishing emails containing a ZIP archive as a approach to set off the an infection. The cybersecurity firm’s evaluation is predicated on the ZIP artifact that was uploaded to the VirusTotal platform on October 3, 2025.
Current with the archive is a decoy Russian-language doc that purports to be a notification associated to earnings tax laws and a Home windows shortcut (LNK) file.
The LNK file, which has the identical title because the ZIP archive (i.e., “Перерасчет заработной платы 01.10.2025”), is accountable for the execution of the .NET implant (“adobe.dll”) utilizing a official Microsoft binary named “rundll32.exe,” a living-off-the-land (LotL) approach recognized to be adopted by risk actors.

The backdoor, Seqrite famous, comes with capabilities to examine if it is working with administrator-level privileges, collect an inventory of put in antivirus merchandise, and open the decoy doc as a ruse, whereas it stealthily connects to a distant server (“91.223.75[.]96”) to obtain additional instructions for execution.
The instructions enable CAPI Backdoor to steal information from internet browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox; take screenshots; accumulate system info; enumerate folder contents; and exfiltrate the outcomes again to the server.

It additionally makes an attempt to run a protracted record of checks to find out if it is a official host or a digital machine, and makes use of two strategies to determine persistence, together with organising a scheduled activity and making a LNK file within the Home windows Startup folder to robotically launch the backdoor DLL copied to the Home windows Roaming folder.
Seqrite’s evaluation that the risk actor is focusing on the Russian car sector is right down to the truth that one of many domains linked to the marketing campaign is known as carprlce[.]ru, which seems to impersonate the official “carprice[.]ru.”
“The malicious payload is a .NET DLL that capabilities as a stealer and establishes persistence for future malicious actions,” researchers Priya Patel and Subhajeet Singha mentioned.

The Hacker News Tags:.NET, Auto, Backdoor, CAPI, ECommerce, Firms, Phishing, Russian, Targets, ZIPs

Post navigation

Previous Post: PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
Next Post: New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft

Related Posts

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections The Hacker News
CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks The Hacker News
FedRAMP at Startup Speed: Lessons Learned FedRAMP at Startup Speed: Lessons Learned The Hacker News
Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls The Hacker News
Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors The Hacker News
Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News