Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Belarusian Spyware ResidentBat Targets Journalists with Precision

Belarusian Spyware ResidentBat Targets Journalists with Precision

Posted on February 26, 2026 By CWS

A novel Android spyware known as ResidentBat has been traced back to the Belarusian KGB, offering state agents extensive access to the mobile devices of journalists and members of civil society. This discovery underscores the persistent threat posed by government-linked cyber surveillance.

Development and Discovery

Unveiled to the public in December 2025, ResidentBat was the focus of a collaborative investigation by Reporters Without Borders (RSF) and RESIDENT.NGO. The malware’s coding history indicates it might have been under development since 2021, operating clandestinely long before its official exposure.

ResidentBat’s deployment strategy distinguishes it from typical mobile malware. Instead of utilizing malicious links or apps, its installation requires physical access to the target’s Android device. Attackers employ the Android Debug Bridge (ADB) tool to sideload the spyware, manually adjusting permissions and disabling Google Play Protect to avoid detection. This methodical approach ensures that each infected device is specifically targeted by the Belarusian KGB.

Capabilities and Infrastructure

Once installed, ResidentBat can capture extensive sensitive data, ranging from SMS and call logs to audio recordings and screenshots. It also intercepts encrypted messaging app traffic. Analysts from Censys identified the malware’s command-and-control (C2) infrastructure, noting its consistent use of self-signed TLS certificates and a limited port range, which facilitates data reception and command execution.

Beyond data theft, ResidentBat enables operators to remotely erase all data on a compromised device, using the Android DevicePolicyManager.wipeData function, thereby eliminating evidence or punishing targets. As of February 2026, active infrastructure was detected in several countries, including the Netherlands, Germany, Switzerland, and Russia, with Russian autonomous systems playing a significant role.

Evading Detection

ResidentBat’s C2 servers are fortified to resist traditional detection methods. When probed, these servers respond with a 200 OK status and an empty body, regardless of the request details. This pattern pushes detection efforts to focus on TLS-layer indicators.

Adding complexity to its evasion strategy, the servers return static or artificial timestamps in HTTP responses to thwart forensic analysis. The reliance on client certificate authentication embedded within the APK and proprietary communication protocols further complicates detection. Researchers identified five distinct certificate SHA-256 fingerprints, aiding in tracking related infrastructure once a single endpoint is revealed.

For more updates on cybersecurity threats, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source on Google.

Cyber Security News Tags:Android malware, Belarusian KGB, civil society, Cybersecurity, data privacy, Journalists, malware analysis, mobile security, ResidentBat, Spyware

Post navigation

Previous Post: DarkCloud Malware Threatens Enterprises with Credential Theft
Next Post: Dohdoor Backdoor Threatens U.S. Education & Healthcare

Related Posts

Linux Malware Authors Attacking Cloud Environments Using ELF Binaries Linux Malware Authors Attacking Cloud Environments Using ELF Binaries Cyber Security News
Mozilla High Severity Vulnerabilities Enables Remote Code Execution Mozilla High Severity Vulnerabilities Enables Remote Code Execution Cyber Security News
Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware Cyber Security News
CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units Cyber Security News
AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes Cyber Security News
LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cloaking Platform 1Campaign Bypasses Google Ads Security
  • Botnet Uses Polygon Blockchain for Resilient Command Control
  • Fake Zoom Website Exploits 1,437 Users with Spyware
  • Top Risks Boards Must Prioritize in 2026
  • SeaFlower Campaign Targets Web3 Wallets: A Closer Look

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cloaking Platform 1Campaign Bypasses Google Ads Security
  • Botnet Uses Polygon Blockchain for Resilient Command Control
  • Fake Zoom Website Exploits 1,437 Users with Spyware
  • Top Risks Boards Must Prioritize in 2026
  • SeaFlower Campaign Targets Web3 Wallets: A Closer Look

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News