Newly uncovered Batavia spyware campaign is actively targeting Russian companies and government sectors.

A newly uncovered cyber-espionage campaign, dubbed Batavia, is actively targeting Russian organizations, with a focus on both corporate and government sectors. Cybersecurity researchers have linked this sophisticated operation to a coalition of hacktivist groups.

Discovery and Attribution

The Batavia spyware campaign was identified by security analysts at Kaspersky, who have attributed the attacks to the Cyber Anarchy Squad (C.A.S)—a well-known hacktivist collective. The group is reportedly collaborating with other entities, including the Ukrainian Cyber Alliance and DARKSTAR, to orchestrate these attacks. Their activities are characterized by a strategic targeting of organizations based in Russia and Belarus, regardless of industry.

Attack Vectors and Techniques

Unlike many traditional cyberattacks that rely on phishing emails, Batavia operators primarily exploit vulnerabilities in widely used enterprise software such as Jira, Confluence, and Microsoft SQL Server. This approach allows them to gain initial access to target networks without triggering common email-based security defenses.

Once inside, attackers deploy a range of remote access tools (RATs), including:

  • Revenge RAT
  • Spark RAT
  • Meterpreter reverse shell (from the Metasploit framework)

To maximize the impact, the attackers utilize credential-stealing utilities such as XenAllPasswordPro, BrowserThief, and Mimikatz, enabling them to harvest passwords and browser data from compromised systems.

Data Theft and Operational Impact

The Batavia spyware provides attackers with extensive control over infected systems. Capabilities include:

  • Exfiltration of sensitive files and corporate data
  • Remote execution of system commands
  • File management and manipulation
  • Surveillance via webcams and microphones
  • Collection of detailed system and user information

Stolen data is often leaked on public Telegram channels, amplifying the reputational damage to victim organizations and increasing pressure on affected entities.

Persistence and Evasion Strategies

To maintain long-term access, Batavia establishes persistence by creating unauthorized administrative accounts and altering system registry keys. The malware also employs sophisticated evasion tactics, such as disabling endpoint protection and adding malicious files to Windows Defender exclusion lists. By mimicking legitimate Windows processes, the spyware significantly reduces the likelihood of detection.

Collaborative Threat Ecosystem

The campaign is notable for the high degree of collaboration among threat actors. Groups share tools, access, and intelligence, creating a robust ecosystem that enhances the effectiveness and reach of their operations. This collective approach allows for rapid adaptation and escalation of attacks across multiple sectors.

Indicators of Compromise

Security teams should be vigilant for suspicious file names and paths commonly associated with Batavia-related malware, such as:

File NamePath Example
svxhost.exeC:\Windows\System32\svxhost.exe
svrhost.exeC:\Windows\system32\svrhost.exe
rpchost.exeC:\Windows\System32\drivers\etc\rpchost.exe
ssbyt.exeC:\Windows\panther\ssbyt.exe
svhost.exeC:\Users$$USERNAME]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.exe