Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Student protester Mohsen Mahdawi unveils legal defence fund for immigrants | Donald Trump News

May 8, 2025

Microsoft employees are banned from using DeepSeek app, president says 

May 8, 2025

Google launches ‘implicit caching’ to make accessing its latest AI models cheaper

May 8, 2025
Facebook X (Twitter) Instagram
Trending
  • Student protester Mohsen Mahdawi unveils legal defence fund for immigrants | Donald Trump News
  • Microsoft employees are banned from using DeepSeek app, president says 
  • Google launches ‘implicit caching’ to make accessing its latest AI models cheaper
  • Google rolls out AI tools to protect Chrome users against scams
  • Exhibit your startup at TechCrunch Sessions: AI while you still can! 
  • ECB taps FinTech and banking sector for next-gen payment solutions
  • US strikes first trade agreement with UK in a ‘breakthrough deal’ | International Trade News
  • AI code review platform CodeAnt AI raises $2m to speed up software development
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Friday, May 9
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Google Finds Data Theft Malware Used by Russian APT in Select Cases
Cybersecurity

Google Finds Data Theft Malware Used by Russian APT in Select Cases

adminBy adminMay 8, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 1


Russian state-sponsored APT group Star Blizzard has been using the ClickFix technique to distribute new information stealer malware, Google warns.

Also known as UNC4057, Callisto, Coldriver, and Seaborgium, and active since at least 2019, Star Blizzard was publicly linked to Russia’s Federal Security Service (FSB) by the US in December 2023. In October 2024, over 100 domains the APT used for spear-phishing were seized.

Known for targeting academic organizations, NATO governments, NGOs, and think tanks for intelligence collection, mainly from email accounts, the threat actor would deliver malware and attempt to access system files only in select cases.

Recent campaigns, Google says, targeted “current and former advisors to Western governments and militaries, as well as journalists, think tanks, and NGOs”, as well as individuals connected to Ukraine.

In attacks observed in January, March, and April 2025, Star Blizzard delivered a new malware family named LostKeys as part of a multi-step infection chain that begins with a lure webpage containing a fake Captcha and employing the known ClickFix technique to execute malicious code.

JavaScript code on the page automatically copies a malicious PowerShell command to the clipboard, while the victim is instructed to verify they are human by opening the Run prompt on Windows, to paste and execute the PowerShell command.

The ClickFix technique was initially observed in October 2023, but its mass adoption by threat actors started in August 2024, spiking since the beginning of this year. Both cybercrime and state-sponsored groups have been using it.

“Users should exercise caution when encountering a site that prompts them to exit the browser and run commands on their device, and enterprise policies should implement least privilege and disallow users from executing scripts by default,” Google notes.

Advertisement. Scroll to continue reading.

As part of Star Blizzard’s attacks, the first-stage PowerShell executes code that performs device checks, likely for VM evasion, and fetches a third-stage payload responsible for retrieving and decoding the final payload, the LostKeys malware.

“It is a piece of malware that is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker,” Google notes.

The internet giant also says that LostKeys “is only deployed in highly selective cases” and that it can also steal documents from the infected systems.

Google’s analysis has revealed links to two malware samples dating to December 2023, which use a different execution chain to run the LostKeys malware.

“It is currently unclear if these samples from December 2023 are related to COLDRIVER, or if the malware was repurposed from a different developer or operation into the activity seen starting in January 2025,” Google notes.

Related: France Blames Russia for Cyberattacks on Dozen Entities

Related: Russian Espionage Group Using Ransomware in Attacks

Related: Russian Ransomware Gang Exploited Windows Zero-Day Before Patch

Related: Russian Firm Offers $4 Million for Telegram Exploits



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

May 8, 2025

Europol Announces More DDoS Service Takedowns, Arrests

May 8, 2025

Possible Zero-Day Patched in SonicWall SMA Appliances

May 8, 2025

Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

May 8, 2025

Cisco Patches 35 Vulnerabilities Across Several Products

May 8, 2025

Dozens of SysAid Instances Vulnerable to Remote Hacking

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Skechers’ Greenbergs Set To Pocket Up To $1.1 Billion From Sale To 3G

May 6, 2025

Skechers founders Robert Greenberg (left) and Michael Greenberg (right) started the brand more than 30…

Trump Organization Admits President Still Controls His Business

May 6, 2025

Forbes Richest Person In Every State 2025

April 30, 2025

These Billionaire Signers Of The Giving Pledge Signers On Why The Philanthropy Group Still Matters

April 29, 2025
Our Picks

Student protester Mohsen Mahdawi unveils legal defence fund for immigrants | Donald Trump News

May 8, 2025

Microsoft employees are banned from using DeepSeek app, president says 

May 8, 2025

Google launches ‘implicit caching’ to make accessing its latest AI models cheaper

May 8, 2025

Google rolls out AI tools to protect Chrome users against scams

May 8, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

Microsoft employees are banned from using DeepSeek app, president says 

May 8, 2025

Google launches ‘implicit caching’ to make accessing its latest AI models cheaper

May 8, 2025

Google rolls out AI tools to protect Chrome users against scams

May 8, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.