Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

Posted on July 8, 2025July 8, 2025 By CWS

Jul 08, 2025Ravie LakshmananCyber Espionage / Risk Intelligence
Russian organizations have been focused as a part of an ongoing marketing campaign that delivers a beforehand undocumented Home windows adware referred to as Batavia.
The exercise, per cybersecurity vendor Kaspersky, has been lively since July 2024.
“The focused assault begins with bait emails containing malicious hyperlinks, despatched beneath the pretext of signing a contract,” the Russian firm mentioned. “The principle purpose of the assault is to contaminate organizations with the beforehand unknown Batavia adware, which then proceeds to steal inner paperwork.”
The e-mail messages are despatched from the area “oblast-ru[.]com,” which is claimed to be owned by the attackers themselves. The hyperlinks embedded inside the digital missives result in the obtain of an archive file containing a Visible Fundamental Encoded script (.VBE) file.
When executed, the script profiles the compromised host and exfiltrates the system info to the distant server. That is adopted by the retrieval of a next-stage payload from the identical server, an executable written in Delphi.

The malware seemingly shows a faux contract to the sufferer as a distraction whereas accumulating system logs, workplace paperwork (*.doc, *.docx, *.ods, *.odt, *.pdf, *.xls, and *.xlsx), and screenshots within the background. The information gathering additionally extends to detachable gadgets connected to the host.
One other functionality of the Delphi malware is to obtain a binary of its personal from the server, which targets a broader set of file extensions for subsequent assortment. This consists of photos, emails, Microsoft PowerPoint displays, archive recordsdata, and textual content paperwork (*.jpeg, *.jpg, *.cdr, *.csv, *.eml, *.ppt, *.pptx, *.odp, *.rar, *.zip, *.rtf, and *.txt).
The newly collected information is then transmitted to a special area (“ru-exchange[.]com”), from the place an unknown executable is downloaded as a fourth-stage for persevering with the assault chain additional.

Telemetry information from Kaspersky reveals that greater than 100 customers throughout a number of dozen organizations acquired phishing emails over the previous yr.
“Because of the assault, Batavia exfiltrates the sufferer’s paperwork, in addition to info comparable to a listing of put in packages, drivers, and working system parts,” the corporate mentioned.
The disclosure comes as Fortinet FortiGuard Labs detailed a malicious marketing campaign that delivers a Home windows stealer malware codenamed NordDragonScan. Whereas the precise preliminary entry vector will not be clear, it is believed to be a phishing e-mail that propagates a hyperlink to set off the obtain of an RAR archive.
“As soon as put in, NordDragonScan examines the host and copies paperwork, harvests complete Chrome and Firefox profiles, and takes screenshots,” safety researcher Cara Lin mentioned.

Current inside the archive is a Home windows shortcut (LNK) file that stealthily makes use of “mshta.exe” to execute a remotely hosted HTML Software (HTA). This step leads to the retrieval of a benign decoy doc, whereas a nefarious .NET payload is quietly dropped onto the system.

NordDragonScan, because the stealer malware known as, establishes connections with a distant server (“kpuszkiev[.]com”), units up persistence through Home windows Registry modifications, and conducts intensive reconnaissance of the compromised machine to gather delicate information and exfiltrate the data again to the server through an HTTP POST request.
“The RAR file accommodates LNK calls that invoke mshta.exe to execute a malicious HTA script, displaying a decoy doc in Ukrainian, Lin mentioned. “Lastly, it quietly installs its payload within the background. NordDragonScan is able to scanning the host, capturing a screenshot, extracting paperwork and PDFs, and sniffing Chrome and Firefox profiles.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Batavia, Documents, Firms, Researchers, Russian, Spyware, Stealing, Uncover, Windows

Post navigation

Previous Post: 10 Best ZTNA Solutions (Zero Trust Network Access) in 2025
Next Post: Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence

Related Posts

CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation The Hacker News
The State of AI in the SOC 2025 The Hacker News
Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign The Hacker News
CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation The Hacker News
Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data The Hacker News
Active Exploitation Detected in Gladinet and TrioFox Vulnerability The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark