Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Moonvalley’s “ethical” AI video model for filmmakers has been released

Phone (3) Reviews | TechCrunch

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers reveal Batavia window spyware and steal documents from Russian companies
Identity

Researchers reveal Batavia window spyware and steal documents from Russian companies

userBy userJuly 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 8, 2025Ravi LakshmananCyber ​​Spy/Threat Intelligence

Batavia Windows Spyware

The Russian organization is being targeted as part of an ongoing campaign to provide previously undocumented Windows spyware called Batavia.

Activities for each cybersecurity vendor Kaspersky have been active since July 2024.

“Targeted attacks start with bait emails containing malicious links sent under the pretext of signing a contract,” the Russian company said. “The main goal of the attack is to infect your organization with previously unknown Batavia spyware, which steals internal documents.”

Email messages are sent from the domain[.]com, “This is said to be owned by the attacker himself. Links embedded in digital miscibles lead to downloading archive files containing Visual Basic Encoded Script (.Vbe) files.

When executed, the script profiles the compromised host and removes system information to the remote server. This is followed by the retrieval of the next stage of payload from the same server, an executable file written in Delphi.

Cybersecurity

Malware can display fake contracts to victims as a distraction, collecting system logs, office documents (*.doc, *.docx, *.ods, *.odt, *.pdf, *.xls, and *.xlsx), and screenshots in the background. Data collection is also extended to removable devices connected to the host.

Another feature of Delphi malware is to download its own binary from the server. This targets a broader set of file extensions for subsequent collections. This includes images, emails, Microsoft PowerPoint presentations, archive files, and text documents (*.jpeg, *.jpg, *.cdr, *.csv, *.eml, *.ppt, *.pptx, *.odp, *.rar, *.zip, *.rtf, and *.txt).

The newly collected data will be sent to another domain (“ru-exchange[.]com) from where unknown executables are downloaded as the fourth stage to further continue the attack chain.

Kaspersky’s telemetry data shows that over 100 users from dozens of organizations have received phishing emails over the past year.

“As a result of the attack, Batavia will rule out information such as victim documents and listings of installed programs, drivers and operating system components,” the company said.

This disclosure is because Fortinet Fortiguard Labs details a malicious campaign that provides Windows Stealer malware, codenamed Norddragonscan. The exact initial access vector is not clear, but it is considered to be a phishing email that propagates the link that triggers the download of the RAR archive.

“When Norddragonscan is installed, it examines the host, copies the documents, harvests the entire chrome and Firefox profile and takes screenshots,” says security researcher Cara Lin.

Cybersecurity

Residing in the archive is a Windows Shortcut (LNK) file that uses “MSHTA.EXE” to run a remotely hosted HTML application (HTA). This step searches for benign decoy documents, but the evil .NET payload is silently dropped onto the system.

norddragonscan establishes a connection with a remote server, as it is called steeler malware (“kpuszkievi[.]com”) sets persistence via changes to the Windows registry, conducts extensive reconnaissance of compromised machines, collects sensitive data and returns information to the server via HTTP POST requests.

“The RAR file contains an LNK call that calls MSHTA.EXE to run a malicious HTA script, which displays decoy documents in Ukrainian. Norddragonscan can scan hosts, capture screenshots, extract documents and PDFs, and sniff profiles in Chrome and Firefox.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFlorida home insurance companies disproportionately drop low-income households
Next Article The next huge leap for sustainability in the UK space sector
user
  • Website

Related Posts

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

July 8, 2025

Five ways identity-based attacks are violating retail

July 8, 2025

Rondodox Botnet Exploits TBK DVR and 4 faithful router flaws launch Explaws DDOS attack

July 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Moonvalley’s “ethical” AI video model for filmmakers has been released

Phone (3) Reviews | TechCrunch

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

Why this LA-based VC company was an early investor in Slate Auto

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.