Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information

Posted on July 29, 2025July 29, 2025 By CWS

The commodity infostealer panorama has a brand new entrant in Raven Stealer, a compact Delphi/C++ binary that hijacks Telegram’s bot API to spirit away victims’ browser secrets and techniques.

First seen in mid-July 2025 on a GitHub repository operated by the self-styled ZeroTrace Crew, Raven arrives both packed as a UPX-compressed executable or bundled inside renamed attachments similar to “bill.3mf.exe”.

As soon as executed, the payload runs headlessly, by no means presenting a console window, and instantly prepares the bottom for covert exfiltration.

Assault chains noticed within the wild depend on convincing social-engineering lures that funnel targets to GitHub releases or direct Telegram messages containing the builder’s output.

Inside seconds of execution, the stub enumerates put in Chromium-based browsers, decrypts saved passwords and cookies, and scoops cryptocurrency wallets and autofill information right into a tidy folder hierarchy.

Cyfirma analysts famous the stealer’s disciplined listing construction—%Native%RavenStealerChrome, Edge, and Crypto Wallets—which simplifies post-infection triage for menace actors.

The ramifications are extreme: a single an infection yields area credentials, fee card particulars, and chronic session cookies that bypass MFA.

Compounding the menace, exfiltration leverages Telegram’s /sendDocument endpoint, permitting operators to obtain ZIP archives over an encrypted channel that almost all company firewalls allow by default.

Raven steler (Supply – Cyfirma)

This dashboard reveals Raven’s ensuing archive, whose filename embeds the sufferer’s username for easy cataloguing.

An infection Mechanism: Reflective Course of Hollowing inside Chromium

Raven’s most placing trick lies in its in-memory DLL injection chain. After unpacking itself (entropy >7 confirms UPX), the dropper decrypts an embedded DLL saved below useful resource ID 101 and harvests the Telegram bot_token and chat_id from assets 102 and 103.

Extracting Bot Token and ChatID (Supply – Cyfirma)

It then spawns chrome.exe in a suspended state with –headless –disable-gpu –no-sandbox, allocates reminiscence by way of NtAllocateVirtualMemory, and maps the DLL into the brand new course of—bypassing user-land hooks and hiding behind the browser’s professional signature.

A fraction of the resource-extraction routine illustrates Raven’s low-level fashion:-

HRSRC hRes = FindResourceW(NULL, MAKEINTRESOURCE(102), RT_RCDATA);
DWORD sz = SizeofResource(NULL, hRes);
BYTE* pBuf = (BYTE*)LockResource(LoadResource(NULL, hRes));
// pBuf now holds the Telegram bot token in plain textual content

As soon as assortment finishes, PowerShell compresses %Native%RavenStealer into %TEMP%_RavenStealer.zip, and curl.exe pushes the file to

A minimal YARA rule launched by Cyfirma pinpoints the menace by matching strings similar to “passwords.txt”, “api.telegram.org”, and the SHA-256 hash 28d6fbbd…55 embedded in older builds:-

$s1 = “api.telegram.org” nocase
$s2 = “%Native%RavenStealerChrome” nocase
situation: 3 of ($s*)

By intertwining stealth packing, syscall-level injection, and Telegram C2, Raven Stealer underscores how little experience is now required to mount high-yield credential-theft campaigns.

Expertise quicker, extra correct phishing detection and enhanced safety for your online business with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:Autofill, Based, Credentials, Data, Information, Login, Malware, Payment, Raven, Stealer, Steals, Telegram

Post navigation

Previous Post: The New JavaScript Injection Playbook
Next Post: From Ex Machina to Exfiltration: When AI Gets Too Curious

Related Posts

Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials Cyber Security News
Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Cyber Security News
CrowdStrike Set to Acquire Onum in $290 Million Deal to Enhance Falcon Next-Gen SIEM Cyber Security News
Great Firewall of China’s Sensitive Data of Over 500GB+ Leaked Online Cyber Security News
Microsoft Teams RCE Vulnerability Let Attackers Read, Write and Delete Messages Cyber Security News
28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores
  • Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
  • SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
  • KillSec Ransomware Attacking Healthcare Industry IT Systems
  • Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores
  • Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
  • SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
  • KillSec Ransomware Attacking Healthcare Industry IT Systems
  • Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News