InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs
Technology

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025 3 Min Read
Share

Cybersecurity researchers have identified a previously undocumented .NET malware. CAPI backdoor.

According to Seqrite Labs, the attack chain includes distributing phishing emails with ZIP archives as a method of causing infection. The cybersecurity firm’s analysis is based on a ZIP artifact uploaded to the VirusTotal platform on October 3, 2025.

The archive contains decoy Russian language documents and Windows shortcut (LNK) files disguised as notifications related to the Income Tax Act.

The LNK file with the same name as the ZIP archive (i.e. “Перерасчет заработной платы 01.10.2025”) runs a .NET implant (“adobe.dll”) using the genuine Microsoft binary (LotL) technique called “rundll32.exe”. Known to be employed by threat actors.

According to Seqrite, the backdoor has the ability to check if it is running with administrator-level privileges, collect a list of installed antivirus products, and open a decoy document as a ruse, while secretly connecting to a remote server (91.223.75(.)96) to receive further commands for execution.

This command allows CAPI backdoors to steal data from web browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox. Take a screenshot. Collect system information. Enumerate the contents of a folder. It then extracts the results and sends them back to the server.

It also tries to perform a long list of checks to determine whether it is a legitimate host or a virtual machine. It also uses two methods to establish persistence. This includes configuring scheduled tasks and creating an LNK file in the Windows Startup folder to automatically launch backdoor DLLs that are copied to the Windows Roaming folder.

Seqrite’s assessment that this actor is targeting the Russian automotive sector is due to the fact that one of the domains linked to the campaign is named carprlce(.)ru, which appears to be masquerading as the legitimate “carprice(.)ru”.

See also  CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

“The malicious payload is a .NET DLL that acts as a stealer and establishes persistence against future malicious activity,” researchers Priya Patel and Subhajeet Singha said.

Share This Article
Twitter Copy Link
Previous Article A new demo for medieval RPG Norse, which combines the combat of BG3 with the charm of Kingdom Come Deliverance 2, has been added to your Steam wishlist A new demo for medieval RPG Norse, which combines the combat of BG3 with the charm of Kingdom Come Deliverance 2, has been added to your Steam wishlist
Next Article 'No Kings' protests against Trump bring street party atmosphere to cities across the US ‘No Kings’ protests against Trump bring street party atmosphere to cities across the US

You Might Also Like

SonicWall Urges Password Resets
Technology

SonicWall prompts password reset after a cloud backup violation affecting less than 5% of customers

4 Min Read
Cisco Asa Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive
Technology

Cisco Asa Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive

3 Min Read
Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware
Technology

Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware

3 Min Read
Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Technology

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?