Close Menu
newzz.net
    Facebook X (Twitter) Instagram
    Trending
    • This could be our first look at Samsung’s svelte Galaxy Glasses
    • Ceramic industry expects demand to pick up post-West Asia war
    • 186. President Aleksandar Vučić: Russia, China, and How Serbia Could Join the EU
    • 10 Fun Facts About the American Goldfinch
    • ‘I like making money’: Stephen Nolan defends salary amid proposed BBC cuts
    • Anthropic Valuation Hits $1 Trillion, Surpassing OpenAI
    • Indian IT doubles down on acquisition with focus on AI, cloud and specialised skills
    • Global conference on transitioning away from fossil fuels begins – A greener life, a greener world
    newzz.net
    Tuesday, April 28
    • Home
    • Top Stories
    • Technology
    • Business
    • Politics
    • Health
    • Loans
    • Interest Rates
    • Mortgage
    • Entertainment & Arts
    • Science & Environment
    • Smart Solutions
    newzz.net
    You are at:Home»Technology»New Russian Malware in Action
    Technology

    New Russian Malware in Action

    Editorial TeamBy Editorial TeamMay 10, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    New Russian Malware in Action

    The shadowy world of cyber espionage has a new player on the field: a sneaky piece of malware dubbed “LostKeys.” According to Google, a Russian state-backed malware crew known as COLDRIVER has been using LostKeys since the start of the year to snoop on Western governments, journalists, think tanks, and non-governmental organizations.

    COLDRIVER isn’t exactly a new kid on the block. Back in December, the UK and its “Five Eyes” intelligence allies pointed the finger at them. The hacking group was directly linked to Russia’s Federal Security Service (FSB), which is basically their counterintelligence and internal security bigwig.

    Google discloses LostKeys, a malware linked to Russia

    Google’s Threat Intelligence Group (GTIG) first spotted LostKeys in January. It seems COLDRIVER has been deploying it in very targeted “ClickFix” attacks. Think of these as digital con jobs where they trick people into running dodgy PowerShell scripts. Basically, ClickFix attacks are based on classic social engineering.

    Once those scripts are running, they pave the way for even more PowerShell nastiness to be downloaded and executed. Their main goal is the installation of LostKeys, which Google has identified as a Visual Basic Script (VBS) data theft malware. According to GTIG’s report, LostKeys is like a “digital vacuum cleaner” that extracts specific files and directories. It also sends system info and runs processes back to the attackers.

    COLDRIVER’s usual MO involves stealing login details to pilfer emails and contacts. However, they’ve also been known to deploy another malware called SPICA for grabbing documents and files. LostKeys seems to be serving a similar purpose, but it’s only brought out for those “highly selective cases.” This suggests that it’s a more specialized tool in COLDRIVER’s espionage toolkit.

    Interestingly, COLDRIVER isn’t the only state-sponsored group dabbling in these ClickFix attacks. The cyber underworld is apparently a fan of this tactic, with groups linked to North Korea (Kimsuky), Iran (MuddyWater), and even other Russian actors (APT28 and UNK_RemoteRogue) all using similar methods in their recent spying campaigns.

    COLDRIVER operating since 2017

    COLDRIVER is also known by a few other aliases, like Star Blizzard and Callisto Group. It has been honing their social engineering and open-source intelligence skills to trick targets since at least 2017. Their targets have ranged from defense and government organizations to NGOs and politicians. The group’s attacks have been increasing, especially after Russia’s invasion of Ukraine, even expanding to defense-industrial sites and US Department of Energy facilities.

    The US State Department has even slapped sanctions on a couple of COLDRIVER operatives (one reportedly an FSB officer). Currently, US authorities are offering a hefty $10 million reward for any tips that could help track down other members. This reflects the level of seriousness with which the US is taking the group.

    action Malware Russian
    Previous ArticlePak using civil airlines as shield against India’s counter offensive
    Next Article New Legislation Offers Vital Support for Habitat Conservation in Cities and Towns
    Editorial Team
    • Website

    Related Posts

    This could be our first look at Samsung’s svelte Galaxy Glasses

    Anthropic Valuation Hits $1 Trillion, Surpassing OpenAI

    These are the 10 best Shizuku apps for leveling up Android

    Comments are closed.

    • Facebook
    • Twitter
    • Instagram
    • Pinterest
    Don't Miss

    This could be our first look at Samsung’s svelte Galaxy Glasses

    Ceramic industry expects demand to pick up post-West Asia war

    186. President Aleksandar Vučić: Russia, China, and How Serbia Could Join the EU

    10 Fun Facts About the American Goldfinch

    About

    Welcome to Newzz.net, your trusted source for timely, accurate, and insightful news from around the world. We are dedicated to delivering the latest updates and in-depth analysis across a wide range of topics, ensuring our readers stay informed, empowered, and engaged.
    We're social, connect with us:

    Popular Posts

    This could be our first look at Samsung’s svelte Galaxy Glasses

    April 27, 2026

    Ceramic industry expects demand to pick up post-West Asia war

    April 27, 2026

    186. President Aleksandar Vučić: Russia, China, and How Serbia Could Join the EU

    April 27, 2026
    Categories
    • Business
    • Entertainment & Arts
    • Health
    • Interest Rates
    • Loans
    • Mortgage
    • Politics
    • Science & Environment
    • Smart Solutions
    • Technology
    • Top Stories
    Copyright © 2026. newzz.net Designed by Webwazirds7.
    • About Us
    • Privacy Policy
    • Terms and Conditions
    • Contact Us

    Type above and press Enter to search. Press Esc to cancel.