Security researchers have uncovered a sophisticated phishing campaign that’s been active since July 2024, targeting Russian enterprises with Batavia , a previously undocumented Windows spyware designed for document theft and internal reconnaissance 🎣 Infection Begins with Phishing Fake contract emails arrive from domains like oblast-ru[.]com , used by the attackers. Victims click a link and download an archive containing a malicious .vbe script disguised as a contract 🧩 Multi‑Stage Malware Chain 1. VBE Downloader The Visual Basic‑encoded script profiles the host—collecting OS and system information—and submits it to the C2 server. It then pulls down WebView.exe , saving it to the %TEMP% folder. 2. Delphi‑Based WebView.exe This executable displays a fake contract to distract users while: Collecting documents (*.doc, *.pdf, .xls ), screenshots, system logs, and files from connected devices. Exfiltrating data to ru‑exchange[.]com and pulling another payload, java...