Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information

Posted on July 29, 2025July 29, 2025 By CWS

The commodity infostealer panorama has a brand new entrant in Raven Stealer, a compact Delphi/C++ binary that hijacks Telegram’s bot API to spirit away victims’ browser secrets and techniques.

First seen in mid-July 2025 on a GitHub repository operated by the self-styled ZeroTrace Crew, Raven arrives both packed as a UPX-compressed executable or bundled inside renamed attachments similar to “bill.3mf.exe”.

As soon as executed, the payload runs headlessly, by no means presenting a console window, and instantly prepares the bottom for covert exfiltration.

Assault chains noticed within the wild depend on convincing social-engineering lures that funnel targets to GitHub releases or direct Telegram messages containing the builder’s output.

Inside seconds of execution, the stub enumerates put in Chromium-based browsers, decrypts saved passwords and cookies, and scoops cryptocurrency wallets and autofill information right into a tidy folder hierarchy.

Cyfirma analysts famous the stealer’s disciplined listing construction—%Native%RavenStealerChrome, Edge, and Crypto Wallets—which simplifies post-infection triage for menace actors.

The ramifications are extreme: a single an infection yields area credentials, fee card particulars, and chronic session cookies that bypass MFA.

Compounding the menace, exfiltration leverages Telegram’s /sendDocument endpoint, permitting operators to obtain ZIP archives over an encrypted channel that almost all company firewalls allow by default.

Raven steler (Supply – Cyfirma)

This dashboard reveals Raven’s ensuing archive, whose filename embeds the sufferer’s username for easy cataloguing.

An infection Mechanism: Reflective Course of Hollowing inside Chromium

Raven’s most placing trick lies in its in-memory DLL injection chain. After unpacking itself (entropy >7 confirms UPX), the dropper decrypts an embedded DLL saved below useful resource ID 101 and harvests the Telegram bot_token and chat_id from assets 102 and 103.

Extracting Bot Token and ChatID (Supply – Cyfirma)

It then spawns chrome.exe in a suspended state with –headless –disable-gpu –no-sandbox, allocates reminiscence by way of NtAllocateVirtualMemory, and maps the DLL into the brand new course of—bypassing user-land hooks and hiding behind the browser’s professional signature.

A fraction of the resource-extraction routine illustrates Raven’s low-level fashion:-

HRSRC hRes = FindResourceW(NULL, MAKEINTRESOURCE(102), RT_RCDATA);
DWORD sz = SizeofResource(NULL, hRes);
BYTE* pBuf = (BYTE*)LockResource(LoadResource(NULL, hRes));
// pBuf now holds the Telegram bot token in plain textual content

As soon as assortment finishes, PowerShell compresses %Native%RavenStealer into %TEMP%_RavenStealer.zip, and curl.exe pushes the file to

A minimal YARA rule launched by Cyfirma pinpoints the menace by matching strings similar to “passwords.txt”, “api.telegram.org”, and the SHA-256 hash 28d6fbbd…55 embedded in older builds:-

$s1 = “api.telegram.org” nocase
$s2 = “%Native%RavenStealerChrome” nocase
situation: 3 of ($s*)

By intertwining stealth packing, syscall-level injection, and Telegram C2, Raven Stealer underscores how little experience is now required to mount high-yield credential-theft campaigns.

Expertise quicker, extra correct phishing detection and enhanced safety for your online business with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:Autofill, Based, Credentials, Data, Information, Login, Malware, Payment, Raven, Stealer, Steals, Telegram

Post navigation

Previous Post: The New JavaScript Injection Playbook
Next Post: From Ex Machina to Exfiltration: When AI Gets Too Curious

Related Posts

Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack Cyber Security News
Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges Cyber Security News
New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware Cyber Security News
Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation Cyber Security News
Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News