Article Details
Scrape Timestamp (UTC): 2025-05-08 13:43:09.707
Original Article Text
Click to Toggle View
Google links new LostKeys data theft malware to Russian cyberspies. Since the start of the year, the Russian state-backed ColdRiver hacking group has been using new LostKeys malware to steal files in espionage attacks targeting Western governments, journalists, think tanks, and non-governmental organizations. In December, the United Kingdom and Five Eyes allies linked ColdRiver to Russia's Federal Security Service (FSB), the country's counterintelligence and internal security service. Google Threat Intelligence Group (GTIG) first observed LostKeys being "deployed in highly selective cases" in January as part of ClickFix social engineering attacks, where the threat actors trick targets into running malicious PowerShell scripts. Running these scripts downloads and executes additional PowerShell payloads on the victims' devices, ending with a Visual Basic Script (VBS) data theft malware tracked by Google as LostKeys. "LOSTKEYS is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker," GTIG said. "The typical behavior of COLDRIVER is to steal credentials and then use them to steal emails and contacts from the target, but as we have previously documented they will also deploy malware called SPICA to select targets if they want to access documents on the target system. LOSTKEYS is designed to achieve a similar goal and is only deployed in highly selective cases.' ColdRiver is not the only state-backed threat group hacking into their targets' devices in ClickFix attacks, with Kimsuky (North Korea), MuddyWater (Iran), APT28, and UNK_RemoteRogue (Russia) having all used these same tactics in espionage campaigns in recent months. Also tracked as Star Blizzard, Callisto Group, and Seaborgium, the ColdRiver hacking group has used social engineering and open-source intelligence (OSINT) skills to research and lure targets since at least 2017. Five Eyes cyber agencies also warned in December 2023 of ColdRiver's spear-phishing attacks against defense, governmental organizations, NGOs, and politicians, months after Russia invaded Ukraine, and these attacks also expanded to targeting defense-industrial targets and U.S. Department of Energy facilities. In 2022, the Microsoft Threat Intelligence Center (MSTIC) disrupted another ColdRiver social engineering operation where the attackers used Microsoft accounts to harvest emails and monitor the activity of organizations and high-profile individuals in NATO countries. The U.S. State Department sanctioned two ColdRiver operators (one of them an FSB officer) in December 2023, who were also indicted by the U.S. Justice Department for their involvement in a global hacking campaign coordinated by the Russian government. The State Department now offers up to $10 million in rewards for tips that could help law enforcement locate or identify other ColdRiver members. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
The Russian state-supported hacking group ColdRiver has been actively using a new malware, LostKeys, for espionage purposes against Western governments, journalists, and NGOs since early this year.
Google’s Threat Intelligence Group identified the LostKeys malware being used in ClickFix social engineering attacks to execute malicious PowerShell scripts on targets' devices.
LostKeys is designed to steal specific file types and gather system information, furthering ColdRiver’s espionage capabilities.
In December, ColdRiver was definitively linked by the UK and Five Eyes to Russia’s Federal Security Service (FSB), indicating state-backed cyber activities.
Other state-backed groups from countries like North Korea, Iran, and additional Russian groups have conducted similar espionage tactics using social engineering.
The U.S. State Department has placed sanctions and offered rewards up to $10 million for information leading to the capture or identification of ColdRiver members.
ColdRiver has also targeted governmental and defense-industrial sectors in the U.S. and NATO countries, continuing aggressive cyber espionage post-Russia’s invasion of Ukraine.