COLDRIVER using new malware to steal from Western targets — Google

By: cryptosheadlines|2025/05/08 03:30:02
0
Share
copy
Airdrop Is Live CaryptosHeadlines Media Has Launched Its Native Token CHT. Airdrop Is Live For Everyone, Claim Instant 5000 CHT Tokens Worth Of $50 USDT. Join the Airdrop at the official website, CryptosHeadlinesToken.com Threat group COLDRIVER is using new malware to steal documents from Western targets, according to a May 7 report from Google Threat Intelligence. The malware, called LOSTKEYS, shows the evolution of the group from credential phishing to more sophisticated attacks.According to the Google report, the new malware is installed through four steps. The process involves a “lure website” with a fake CAPTCHA, a PowerShell script downloaded to the user’s clipboard, some device evasion, and retrieval of the final payload. Lastly, the malware is installed.LOSTKEYS payload delivery. Source: GoogleLOSTKEYS is capable of stealing files from extensions and directories. It can also send system information and running processes back to COLDRIVER. The address from which the parts of the attack come is “165.227.148[.]68” according to Google.The company says it has already taken steps to mitigate any damage the LOSTKEYS malware will cause, including adding the malicious websites to the company’s “Safe Browsing” feature.According to Google, COLDRIVER is a Russian-backed threat group that typically engages in phishing attempts at high-profile Western targets, such as former diplomats, and journalists. In January 2024, it started an attack with a malware called “Spica,” which can execute arbitrary shell commands and download or upload software.Related: Crypto drainers now sold as easy-to-use malware at IT industry fairsCrypto hack losses hit all-time high in 2025Crypto hacks have surged in 2025, with total losses reaching $2 billion in the first quarter alone — exceeding all losses recorded in 2024. According to a report by crypto cybersecurity firm Hacken, operational flaws and weak access controls remain key vulnerabilities — even among major centralized and decentralized players. Attackers are also increasingly using social engineering tactics to gain victims’ trust.Contributing to last quarter’s losses was the $1.5 billion hack of cryptocurrency exchange Bybit. The February attack was reportedly orchestrated by the Lazarus Group.Magazine: Lazarus Group’s favorite exploit revealed — Crypto hacks analysisSource link

You may also like

How a Structured AI Crypto Trading Bot Won at the WEEX Hackathon

Ritmex demonstrates how disciplined risk control and structured signals can make an AI crypto trading bot more stable and reliable on WEEX, highlighting the importance of combining execution discipline with scalable AI trading systems.

Old Indicator Fails, Three Major New Signals Emerge: BTC True Bottom May Still Be Below $60K

When the grocery shopping auntie on the subway, or Tony the hairdresser, start asking you about BTC, crypto, and cryptocurrency investments, selling immediately will be the only best option.

Meeting OpenClaw Founder at a Hackathon: What Else Can Lobsters Do?

Imperial College London MetaGame: AI Agent × Web3 Landing Three Major Directions.

Huang Renxun's Latest Podcast Transcript: NVIDIA's Future, Embodied Intelligence and Agent Development, Soaring Demand for Inferencing, and AI's PR Crisis

The future of competition is not only about whose model is bigger, whose computing power is stronger, but also about who understands the industry better, who can more deeply integrate AI into real processes, and who can organize these capabilities into a set of executable, scalable systems

How a Structured AI Crypto Trading Bot Won at the WEEX Hackathon

Crypto_Trade shows how structured inputs and controlled adaptability can build a more stable and reliable AI crypto trading bot within the WEEX AI Trading Hackathon, highlighting a practical path toward scalable AI trading systems.

AI Starts to Devour the Manufacturing Industry | Rewire News Morning Edition

When Bezos starts using AI to buy factories instead of building data centers, it shows that he believes the next wave of AI's value is not inside the box.

Popular coins

Latest Crypto News

Read more