Sunday, May 18, 2025
Homecyber securityRussian COLDRIVER Hackers Deploy LOSTKEYS Malware to Steal Sensitive Information

Russian COLDRIVER Hackers Deploy LOSTKEYS Malware to Steal Sensitive Information

Published on

SIEM as a Service

Follow Us on Google News

The Google Threat Intelligence Group (GTIG) has uncovered a sophisticated new malware dubbed LOSTKEYS, attributed to the Russian government-backed threat actor COLDRIVER, also known as UNC4057, Star Blizzard, and Callisto.

Active since at least December 2023, with significant campaigns observed in January, March, and April 2025, LOSTKEYS represents a notable evolution in COLDRIVER’s toolkit, which has historically focused on credential phishing against high-value targets such as NATO governments, NGOs, journalists, think tanks, and former intelligence officers.

This malware is designed to exfiltrate files from specific extensions and directories, alongside harvesting system information and running processes, posing a severe threat to targeted individuals and organizations, particularly those linked to Ukraine or Western governments.

- Advertisement - Google News

GTIG notes that COLDRIVER’s primary objective appears to be intelligence collection aligned with Russia’s strategic interests, occasionally escalating to hack-and-leak operations, as seen in past campaigns targeting UK officials and NGOs.

Multi-Stage Infection Chain Evades Detection

The deployment of LOSTKEYS follows a complex, multi-stage infection chain that begins with a deceptive lure-a fake CAPTCHA on a malicious website.

COLDRIVER Hackers
Stage 1

Once a user “verifies” the CAPTCHA, PowerShell code is copied to their clipboard, and they are prompted to execute it via the Windows “Run” dialog, a technique known as “ClickFix” often used by advanced persistent threats (APTs) and financially motivated actors.

The initial PowerShell script fetches a second-stage payload from a hardcoded IP (165.227.148[.]68), which employs device evasion tactics by calculating the MD5 hash of the display resolution to halt execution on virtual machines (VMs) if specific values are detected.

Subsequent stages involve retrieving Base64-encoded PowerShell scripts and a Visual Basic Script (VBS) decoder, using unique substitution cipher keys per infection chain to decode the final LOSTKEYS payload.

COLDRIVER Hackers
LOSTKEYS PAYLOAD DELIVERY

This intricate process underscores COLDRIVER’s efforts to evade detection and analysis, ensuring the malware is deployed only to select, high-value targets.

GTIG also identified older LOSTKEYS samples from December 2023, disguised as Portable Executable (PE) files mimicking the Maltego software, though their direct link to COLDRIVER remains under investigation.

To counter such threats, Google has integrated findings into Safe Browsing, issued government-backed attacker alerts to at-risk Gmail and Workspace users, and recommends enabling Enhanced Safe Browsing in Chrome alongside regular device updates.

Indicators of Compromise (IOCs)

DescriptionIndicator
Stage 1 – Fake CAPTCHA PowerShell13f7599c94b9d4b028ce02397717a128
Stage 2 – Device Evasion4c7accba35edd646584bb5a40ab78f96
Stage 3 – Payload Retrieval Key6b85d707c23d68f9518e757cc97adb20
Decoder Script Key3233668d2e4a80b17e6357177b53539d
Final Payload (Encoded)6bc411d562456079a8f1e38f3473c33a
Final Payload (Decoded)28a0596b9c62b7b7aca9cac2a07b0671
C2 Server IP165.227.148[.]68
C2 Domaincloudmediaportal[.]com
C2 Domain (Dec 2023)njala[.]dev
C2 IP (Dec 2023)80.66.88[.]67

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...