Crypto News COLDRIVER using new malware to steal from Western targets — Google

  • Please we urge all unregistered users to swiftly register to enable you enjoy loads of benefits rollingout in our community. Be open to opportunities to do good for someone else today. Anything that do not please God in your life has come to distroy you.

Emmanuel

Member
Premium User
Oct 10, 2023
514
2
18
34
Lagos Nigeria
<p style="float:right; margin:0 0 10px 15px; width:240px;"><img src="https://images.cointelegraph.com/im...jYWYtMDEwMC03MGRiLWFkZGYtZGJmMTkxODA2YzYz.jpg"></p><p><p style="float:right; margin:0 0 10px 15px; width:240px;"><img src="https://images.cointelegraph.com/im...jYWYtMDEwMC03MGRiLWFkZGYtZGJmMTkxODA2YzYz.jpg" alt="COLDRIVER using new malware to steal from Western targets — Google"></p><p>Threat group COLDRIVER is using new malware to steal documents from Western targets, <a data-ct-non-breakable="null" href="https://cloud.google.com/blog/topic...ldriver-steal-documents-western-targets-ngos/" rel="null" target="null" text="null" title="null">according</a> to a May 7 report from Google Threat Intelligence. The malware, called LOSTKEYS, shows the evolution of the group from credential phishing to more sophisticated attacks.<p>According to the Google report, the new malware is installed through four steps. The process involves a “lure website” with a fake CAPTCHA, a PowerShell script downloaded to the user’s clipboard, some device evasion, and retrieval of the final payload. Lastly, the malware is installed.</p><figure><img alt="COLDRIVER using new malware to steal from Western targets — Google" src="https://s3.cointelegraph.com/uploads/2025-05/0196abcd-4c38-796a-b60a-ab333ef7f220" title=""><figcaption style="text-align: center;"><em>LOSTKEYS payload delivery. Source: </em><a data-ct-non-breakable="null" href="https://cloud.google.com/blog/topic...ldriver-steal-documents-western-targets-ngos/" rel="nofollow noopener" target="_blank" text="null" title="https://cloud.google.com/blog/topic...ldriver-steal-documents-western-targets-ngos/"><em>Google</em></a></figcaption></figure><p>LOSTKEYS is capable of stealing files from extensions and directories. It can also send system information and running processes back to COLDRIVER. The address from which the parts of the attack come is “165.227.148[.]68” according to Google.</p><p>The company says it has already taken steps to mitigate any damage the LOSTKEYS malware will cause, including adding the malicious websites to the company’s “Safe Browsing” feature.</p><p>According to Google, COLDRIVER is a Russian-backed threat group that typically engages in phishing attempts at high-profile Western targets, such as former diplomats, and journalists. In January 2024, it <a data-ct-non-breakable="null" href="https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/" rel="nofollow noopener" target="_blank" text="null" title="https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/">started</a> an attack with a malware called “Spica,” which can execute arbitrary shell commands and download or upload software.</p><p><em><strong>Related: </strong></em><a data-ct-non-breakable="null" href="https://cointelegraph.com/news/crypto-drainers-sold-as-malware-at-it-conferences" rel="null" target="null" text="null" title="null"><em><strong>Crypto drainers now sold as easy-to-use malware at IT industry fairs</strong></em></a></p><h2>Crypto hack losses hit all-time high in 2025</h2><p>Crypto hacks have surged in 2025, with total losses reaching $2 billion in the first quarter alone — <a data-ct-non-breakable="null" href="https://cointelegraph.com/news/q1-2025-crypto-hacks-2b-lost" rel="" target="_self" text="null" title="https://cointelegraph.com/news/q1-2025-crypto-hacks-2b-lost">exceeding all losses recorded in 2024</a>. </p><p>According to a report by crypto cybersecurity firm Hacken, operational flaws and weak access controls remain key vulnerabilities — even among major centralized and decentralized players. Attackers are also increasingly using social engineering tactics to gain victims’ trust.</p><p>Contributing to last quarter's losses was the <a data-ct-non-breakable="null" href="https://cointelegraph.com/news/biggest-crypto-hack-history-bybit-exploit-security-blo" rel="null" target="null" text="null" title="null">$1.5 billion hack of cryptocurrency exchange Bybit</a>. The February attack was reportedly <a data-ct-non-breakable="null" href="https://cointelegraph.com/news/lazarus-group-bybit-sony-crypto-supervillain" rel="null" target="null" text="null" title="null">orchestrated by the Lazarus Group</a>.</p><p><a data-ct-non-breakable="null" href="https://cointelegraph.com/magazine/north-korean-hackers-private-keys-flash-loan-attacks/" rel="null" target="null" text="null" title="null"><em><strong>Magazine: Lazarus Group’s favorite exploit revealed — Crypto hacks analysis</strong></em></a></p><template data-name="subscription_form" data-type="crypto_biz" label="Subscription Form: Crypto Biz Newsletter"></template></p>
</p>

840_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjQtMTIvMDE5MzhjYWYtMDEwMC03MGRiLWFkZGYtZGJmMTkxODA2YzYz.jpg



COLDRIVER using new malware to steal from Western targets — Google

Threat group COLDRIVER is using new malware to steal documents from Western targets, according to a May 7 report from Google Threat Intelligence. The malware, called LOSTKEYS, shows the evolution of the group from credential phishing to more sophisticated attacks.
According to the Google report, the new malware is installed through four steps. The process involves a “lure website” with a fake CAPTCHA, a PowerShell script downloaded to the user’s clipboard, some device evasion, and retrieval of the final payload. Lastly, the malware is installed.

COLDRIVER using new malware to steal from Western targets — Google

LOSTKEYS payload delivery. Source: Google

LOSTKEYS is capable of stealing files from extensions and directories. It can also send system information and running processes back to COLDRIVER. The address from which the parts of the attack come is “165.227.148[.]68” according to Google.

The company says it has already taken steps to mitigate any damage the LOSTKEYS malware will cause, including adding the malicious websites to the company’s “Safe Browsing” feature.

According to Google, COLDRIVER is a Russian-backed threat group that typically engages in phishing attempts at high-profile Western targets, such as former diplomats, and journalists. In January 2024, it started an attack with a malware called “Spica,” which can execute arbitrary shell commands and download or upload software.

Related: Crypto drainers now sold as easy-to-use malware at IT industry fairs

Crypto hack losses hit all-time high in 2025​


Crypto hacks have surged in 2025, with total losses reaching $2 billion in the first quarter alone — exceeding all losses recorded in 2024.

According to a report by crypto cybersecurity firm Hacken, operational flaws and weak access controls remain key vulnerabilities — even among major centralized and decentralized players. Attackers are also increasingly using social engineering tactics to gain victims’ trust.

Contributing to last quarter's losses was the $1.5 billion hack of cryptocurrency exchange Bybit. The February attack was reportedly orchestrated by the Lazarus Group.

Magazine: Lazarus Group’s favorite exploit revealed — Crypto hacks analysis

Continue reading...
 

BSF For Soul Wining Support Donation

Total amount
$0.00
Goal
$1,000.00
Donation ends: