Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Hanukkah is Judaism’s ‘festival of lights’

December 12, 2025

Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail

December 12, 2025
Facebook X (Twitter) Instagram
Trending
  • Online rise of Eastern Orthodoxy tests its clergy
  • Hanukkah is Judaism’s ‘festival of lights’
  • Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail
  • Buenos Aires dance hall guarantees tango sessions with pro partners
  • UNESCO gives a shout-out to Switzerland’s yodeling by adding it to list of cultural heritage
  • Rare Dom Pérignon champagne from Charles and Diana’s wedding to be auctioned in Denmark
  • Chase Sui Wonders detoured from Harvard astrophysics to ‘The Studio’
  • Advice for introverts who dread office holiday parties
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Friday, December 12
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Google Finds Data Theft Malware Used by Russian APT in Select Cases
Cybersecurity

Google Finds Data Theft Malware Used by Russian APT in Select Cases

By adminMay 8, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 133


Russian state-sponsored APT group Star Blizzard has been using the ClickFix technique to distribute new information stealer malware, Google warns.

Also known as UNC4057, Callisto, Coldriver, and Seaborgium, and active since at least 2019, Star Blizzard was publicly linked to Russia’s Federal Security Service (FSB) by the US in December 2023. In October 2024, over 100 domains the APT used for spear-phishing were seized.

Known for targeting academic organizations, NATO governments, NGOs, and think tanks for intelligence collection, mainly from email accounts, the threat actor would deliver malware and attempt to access system files only in select cases.

Recent campaigns, Google says, targeted “current and former advisors to Western governments and militaries, as well as journalists, think tanks, and NGOs”, as well as individuals connected to Ukraine.

In attacks observed in January, March, and April 2025, Star Blizzard delivered a new malware family named LostKeys as part of a multi-step infection chain that begins with a lure webpage containing a fake Captcha and employing the known ClickFix technique to execute malicious code.

JavaScript code on the page automatically copies a malicious PowerShell command to the clipboard, while the victim is instructed to verify they are human by opening the Run prompt on Windows, to paste and execute the PowerShell command.

The ClickFix technique was initially observed in October 2023, but its mass adoption by threat actors started in August 2024, spiking since the beginning of this year. Both cybercrime and state-sponsored groups have been using it.

“Users should exercise caution when encountering a site that prompts them to exit the browser and run commands on their device, and enterprise policies should implement least privilege and disallow users from executing scripts by default,” Google notes.

Advertisement. Scroll to continue reading.

As part of Star Blizzard’s attacks, the first-stage PowerShell executes code that performs device checks, likely for VM evasion, and fetches a third-stage payload responsible for retrieving and decoding the final payload, the LostKeys malware.

“It is a piece of malware that is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker,” Google notes.

The internet giant also says that LostKeys “is only deployed in highly selective cases” and that it can also steal documents from the infected systems.

Google’s analysis has revealed links to two malware samples dating to December 2023, which use a different execution chain to run the LostKeys malware.

“It is currently unclear if these samples from December 2023 are related to COLDRIVER, or if the malware was repurposed from a different developer or operation into the activity seen starting in January 2025,” Google notes.

Related: France Blames Russia for Cyberattacks on Dozen Entities

Related: Russian Espionage Group Using Ransomware in Attacks

Related: Russian Ransomware Gang Exploited Windows Zero-Day Before Patch

Related: Russian Firm Offers $4 Million for Telegram Exploits



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

Kalshi’s Cofounder Is Now World’s Youngest Self-Made Woman Billionaire

December 2, 2025

Kalshi is now worth $11 billion, making both its founders billionaires and Luana Lopes Lara…

Billionaire Kwek Leng Beng’s CDL Expands In London With $370 Million Holiday Inn Deal

December 2, 2025

Credo, The Maker Of Purple Cables That Connect Data Centers, Mints Two New Billionaires

December 1, 2025

How A Tiny Polish Startup Became The Multi-Billion-Dollar Voice Of AI

December 1, 2025
Our Picks

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Hanukkah is Judaism’s ‘festival of lights’

December 12, 2025

Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail

December 12, 2025

Buenos Aires dance hall guarantees tango sessions with pro partners

December 12, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.