Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Finds Data Theft Malware Used by Russian APT in Select Cases

Posted on May 8, 2025May 8, 2025 By CWS

Russian state-sponsored APT group Star Blizzard has been utilizing the ClickFix method to distribute new info stealer malware, Google warns.

Also referred to as UNC4057, Callisto, Coldriver, and Seaborgium, and energetic since not less than 2019, Star Blizzard was publicly linked to Russia’s Federal Safety Service (FSB) by the US in December 2023. In October 2024, over 100 domains the APT used for spear-phishing have been seized.

Recognized for concentrating on educational organizations, NATO governments, NGOs, and suppose tanks for intelligence assortment, primarily from electronic mail accounts, the menace actor would ship malware and try and entry system recordsdata solely in choose instances.

Latest campaigns, Google says, focused “present and former advisors to Western governments and militaries, in addition to journalists, suppose tanks, and NGOs”, in addition to people related to Ukraine.

In assaults noticed in January, March, and April 2025, Star Blizzard delivered a brand new malware household named LostKeys as a part of a multi-step an infection chain that begins with a lure webpage containing a pretend Captcha and using the recognized ClickFix method to execute malicious code.

JavaScript code on the web page routinely copies a malicious PowerShell command to the clipboard, whereas the sufferer is instructed to confirm they’re human by opening the Run immediate on Home windows, to stick and execute the PowerShell command.

The ClickFix method was initially noticed in October 2023, however its mass adoption by menace actors began in August 2024, spiking for the reason that starting of this 12 months. Each cybercrime and state-sponsored teams have been utilizing it.

“Customers ought to train warning when encountering a website that prompts them to exit the browser and run instructions on their system, and enterprise insurance policies ought to implement least privilege and disallow customers from executing scripts by default,” Google notes.Commercial. Scroll to proceed studying.

As a part of Star Blizzard’s assaults, the first-stage PowerShell executes code that performs system checks, possible for VM evasion, and fetches a third-stage payload accountable for retrieving and decoding the ultimate payload, the LostKeys malware.

“It’s a piece of malware that’s able to stealing recordsdata from a hard-coded record of extensions and directories, together with sending system info and working processes to the attacker,” Google notes.

The web big additionally says that LostKeys “is simply deployed in extremely selective instances” and that it could actually additionally steal paperwork from the contaminated programs.

Google’s evaluation has revealed hyperlinks to 2 malware samples relationship to December 2023, which use a special execution chain to run the LostKeys malware.

“It’s at present unclear if these samples from December 2023 are associated to COLDRIVER, or if the malware was repurposed from a special developer or operation into the exercise seen beginning in January 2025,” Google notes.

Associated: France Blames Russia for Cyberattacks on Dozen Entities

Associated: Russian Espionage Group Utilizing Ransomware in Assaults

Associated: Russian Ransomware Gang Exploited Home windows Zero-Day Earlier than Patch

Associated: Russian Agency Affords $4 Million for Telegram Exploits

Security Week News Tags:APT, Cases, Data, Finds, Google, Malware, Russian, Select, Theft

Post navigation

Previous Post: Security Tools Alone Don’t Protect You — Control Effectiveness Does
Next Post: Possible Zero-Day Patched in SonicWall SMA Appliances

Related Posts

Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News
Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe Security Week News
From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth Security Week News
Adobe Patches Big Batch of Critical-Severity Software Flaws Security Week News
BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software Security Week News
Malicious NPM Packages Target Cursor AI’s macOS Users Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News