Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information

Posted on July 29, 2025July 29, 2025 By CWS

The commodity infostealer panorama has a brand new entrant in Raven Stealer, a compact Delphi/C++ binary that hijacks Telegram’s bot API to spirit away victims’ browser secrets and techniques.

First seen in mid-July 2025 on a GitHub repository operated by the self-styled ZeroTrace Crew, Raven arrives both packed as a UPX-compressed executable or bundled inside renamed attachments similar to “bill.3mf.exe”.

As soon as executed, the payload runs headlessly, by no means presenting a console window, and instantly prepares the bottom for covert exfiltration.

Assault chains noticed within the wild depend on convincing social-engineering lures that funnel targets to GitHub releases or direct Telegram messages containing the builder’s output.

Inside seconds of execution, the stub enumerates put in Chromium-based browsers, decrypts saved passwords and cookies, and scoops cryptocurrency wallets and autofill information right into a tidy folder hierarchy.

Cyfirma analysts famous the stealer’s disciplined listing construction—%Native%RavenStealerChrome, Edge, and Crypto Wallets—which simplifies post-infection triage for menace actors.

The ramifications are extreme: a single an infection yields area credentials, fee card particulars, and chronic session cookies that bypass MFA.

Compounding the menace, exfiltration leverages Telegram’s /sendDocument endpoint, permitting operators to obtain ZIP archives over an encrypted channel that almost all company firewalls allow by default.

Raven steler (Supply – Cyfirma)

This dashboard reveals Raven’s ensuing archive, whose filename embeds the sufferer’s username for easy cataloguing.

An infection Mechanism: Reflective Course of Hollowing inside Chromium

Raven’s most placing trick lies in its in-memory DLL injection chain. After unpacking itself (entropy >7 confirms UPX), the dropper decrypts an embedded DLL saved below useful resource ID 101 and harvests the Telegram bot_token and chat_id from assets 102 and 103.

Extracting Bot Token and ChatID (Supply – Cyfirma)

It then spawns chrome.exe in a suspended state with –headless –disable-gpu –no-sandbox, allocates reminiscence by way of NtAllocateVirtualMemory, and maps the DLL into the brand new course of—bypassing user-land hooks and hiding behind the browser’s professional signature.

A fraction of the resource-extraction routine illustrates Raven’s low-level fashion:-

HRSRC hRes = FindResourceW(NULL, MAKEINTRESOURCE(102), RT_RCDATA);
DWORD sz = SizeofResource(NULL, hRes);
BYTE* pBuf = (BYTE*)LockResource(LoadResource(NULL, hRes));
// pBuf now holds the Telegram bot token in plain textual content

As soon as assortment finishes, PowerShell compresses %Native%RavenStealer into %TEMP%_RavenStealer.zip, and curl.exe pushes the file to

A minimal YARA rule launched by Cyfirma pinpoints the menace by matching strings similar to “passwords.txt”, “api.telegram.org”, and the SHA-256 hash 28d6fbbd…55 embedded in older builds:-

$s1 = “api.telegram.org” nocase
$s2 = “%Native%RavenStealerChrome” nocase
situation: 3 of ($s*)

By intertwining stealth packing, syscall-level injection, and Telegram C2, Raven Stealer underscores how little experience is now required to mount high-yield credential-theft campaigns.

Expertise quicker, extra correct phishing detection and enhanced safety for your online business with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:Autofill, Based, Credentials, Data, Information, Login, Malware, Payment, Raven, Stealer, Steals, Telegram

Post navigation

Previous Post: The New JavaScript Injection Playbook
Next Post: From Ex Machina to Exfiltration: When AI Gets Too Curious

Related Posts

Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention Cyber Security News
28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild Cyber Security News
Countering Spear Phishing with Advanced Email Security Solutions Cyber Security News
Windows Defender Enhancements for Advanced Threat Mitigation Cyber Security News
Threat Actor Mimo Attacking Magento CMS to Steal Card Details and Bandwidth Monetization Cyber Security News
Comcast to Pay a $1.5 Million Fine to Settle an FCC Investigation Linked to Vendor Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks
  • North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers
  • North Korean Hackers Make History with $2 Billion Crypto Heist in 2025
  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls
  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks
  • North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers
  • North Korean Hackers Make History with $2 Billion Crypto Heist in 2025
  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls
  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark