Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100

October 26, 2025

Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend

October 26, 2025

By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween

October 25, 2025
Facebook X (Twitter) Instagram
Trending
  • Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100
  • Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend
  • By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween
  • Health providers turning to prescriptions to get people outside
  • Poker’s NBA-and-Mafia betting scandal echoes movies, popular culture
  • Book lovers and history buffs find solace in centuries-old athenaeums
  • Grandmothers in Colombia get the quinceañera they never had
  • Russia’s population is getting smaller and older. Putin sees it as a national security threat
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Monday, October 27
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Google Finds Data Theft Malware Used by Russian APT in Select Cases
Cybersecurity

Google Finds Data Theft Malware Used by Russian APT in Select Cases

By adminMay 8, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 95


Russian state-sponsored APT group Star Blizzard has been using the ClickFix technique to distribute new information stealer malware, Google warns.

Also known as UNC4057, Callisto, Coldriver, and Seaborgium, and active since at least 2019, Star Blizzard was publicly linked to Russia’s Federal Security Service (FSB) by the US in December 2023. In October 2024, over 100 domains the APT used for spear-phishing were seized.

Known for targeting academic organizations, NATO governments, NGOs, and think tanks for intelligence collection, mainly from email accounts, the threat actor would deliver malware and attempt to access system files only in select cases.

Recent campaigns, Google says, targeted “current and former advisors to Western governments and militaries, as well as journalists, think tanks, and NGOs”, as well as individuals connected to Ukraine.

In attacks observed in January, March, and April 2025, Star Blizzard delivered a new malware family named LostKeys as part of a multi-step infection chain that begins with a lure webpage containing a fake Captcha and employing the known ClickFix technique to execute malicious code.

JavaScript code on the page automatically copies a malicious PowerShell command to the clipboard, while the victim is instructed to verify they are human by opening the Run prompt on Windows, to paste and execute the PowerShell command.

The ClickFix technique was initially observed in October 2023, but its mass adoption by threat actors started in August 2024, spiking since the beginning of this year. Both cybercrime and state-sponsored groups have been using it.

“Users should exercise caution when encountering a site that prompts them to exit the browser and run commands on their device, and enterprise policies should implement least privilege and disallow users from executing scripts by default,” Google notes.

Advertisement. Scroll to continue reading.

As part of Star Blizzard’s attacks, the first-stage PowerShell executes code that performs device checks, likely for VM evasion, and fetches a third-stage payload responsible for retrieving and decoding the final payload, the LostKeys malware.

“It is a piece of malware that is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker,” Google notes.

The internet giant also says that LostKeys “is only deployed in highly selective cases” and that it can also steal documents from the infected systems.

Google’s analysis has revealed links to two malware samples dating to December 2023, which use a different execution chain to run the LostKeys malware.

“It is currently unclear if these samples from December 2023 are related to COLDRIVER, or if the malware was repurposed from a different developer or operation into the activity seen starting in January 2025,” Google notes.

Related: France Blames Russia for Cyberattacks on Dozen Entities

Related: Russian Espionage Group Using Ransomware in Attacks

Related: Russian Ransomware Gang Exploited Windows Zero-Day Before Patch

Related: Russian Firm Offers $4 Million for Telegram Exploits



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

OpenEvidence’s Daniel Nadler $1.3 Billion Richer In Just Three Months After The AI Startup Hits $6 Billion Valuation

October 20, 2025

OpenEvidence’s Daniel NadlerMauricio Candela for Forbes OpenEvidence, which Forbes profiled in July, has been signing…

Alex Bouaziz On Deel’s Latest Fundraise And Why He’s Not Worried About Litigation

October 20, 2025

Meet The Florida Sugar Barons Worth $4 Billion And Getting Sweet Deals From Donald Trump

October 17, 2025

Why Direct Lending Is Not In A Bubble

October 16, 2025
Our Picks

Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100

October 26, 2025

Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend

October 26, 2025

By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween

October 25, 2025

Health providers turning to prescriptions to get people outside

October 25, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.