Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Security

Russia’s Coldriver Revamps Malware to Evade Detection

Cyberinchief by Cyberinchief
October 22, 2025
Reading Time: 2 mins read
0
Russia’s Coldriver Revamps Malware to Evade Detection


Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime

RELATED POSTS

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

Warning: React2Shell vulnerability already being exploited by threat actors

Russian Intel Hackers Flexible in Face of Detection

Chris Riotta (@chrisriotta) •
October 21, 2025    

Russia's Coldriver Revamps Malware to Evade Detection
A Russian Federal Security Service officer in assault gear. (Image: SGr/Shutterstock)

A Russian state-sponsored cyberespionage group known for targeting policymakers rapidly retooled its malware arsenal and repeatedly simplified then re-complicated its delivery chain to evade detection, according to new research published Monday.

See Also: OnDemand | North Korea’s Secret IT Army and How to Combat It

The hacking group Google’s Threat Intelligence Group tracks as Coldriver began phasing out a Python backdoor in favor of a leaner PowerShell variant dubbed Mayberobot following the public disclosure of its Lostkeys malware in May. Five days later, the group was already operationalizing new malware families and using them more aggressively than in previous campaigns, Google found.

The new toolkit uses fake Captcha pages to trick victims into manually launching a disguised program file, a technique known as “ClickFix.” It allows hackers to install malware in stages while concealing its core components across multiple downloads (see: ClickFix Attacks Increasingly Lead to Infostealer Infections).

Researchers said the rapid shift to this more deceptive delivery method, along with the use of cryptographic key-splitting, reflects a major shift in Coldriver’s tactics and shows how quickly the group can adapt to exposure and defensive countermeasures.

Buy JNews
ADVERTISEMENT

“The shift back to more complex delivery chains increases the difficulty of tracking their campaigns,” the researchers wrote. “This constant development highlights the group’s efforts to evade detection systems for their delivery mechanism for continued intelligence collection against high-value targets.”

U.S. and British authorities in late 2023 linked Coldriver to Russia’s Federal Security Service. Google in 2024 warned the group was shifting from credential-theft phishing to malware delivery. Google researchers reported at the time that the hackers were embedding malicious code into fake PDF documents and convincing targets to download a “decryption” utility that secretly installed a backdoor onto affected devices (see: Russian FSB Hackers Deploy New Lostkeys Malware).

Researchers say the toolkit splits encryption keys across multiple files and registers entries to hinder tracking and analysis.

Google said all identified malicious files and domains tied to the campaign have been added to its Safe Browsing database, and users targeted through Gmail or Workspace received government-backed attacker alerts.

“As Coldriver continues to develop and deploy this chain we believe that they will continue their aggressive deployment against high-value targets to achieve their intelligence collection requirements,” the researchers wrote.





Source link

Tags: ColdriverDetectionEvademalwareRevampsRussias
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security
Cyber Security

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

December 8, 2025
Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data
Cyber Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

December 8, 2025
Warning: React2Shell vulnerability already being exploited by threat actors
Cyber Security

Warning: React2Shell vulnerability already being exploited by threat actors

December 7, 2025
News brief: RCE flaws persist as top cybersecurity threat
Cyber Security

News brief: RCE flaws persist as top cybersecurity threat

December 7, 2025
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber Security

Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

December 6, 2025
GOLD BLADE’s strategic evolution – Sophos News
Cyber Security

GOLD BLADE’s strategic evolution – Sophos News

December 6, 2025
Next Post
Cybersecurity career in 2025

Cybersecurity career in 2025

Murshidabad Cyber Crime: সোশ্যাল মিডিয়া ব্যবহার করে গুজব ছড়ানোর অভিযোগ, ৪৮৬ জনকে জিজ্ঞাসাবাদ

Murshidabad Cyber Crime: সোশ্যাল মিডিয়া ব্যবহার করে গুজব ছড়ানোর অভিযোগ, ৪৮৬ জনকে জিজ্ঞাসাবাদ

Recommended Stories

Collaboration Over Configuration: Educator-Led EdTech with Jamf

Collaboration Over Configuration: Educator-Led EdTech with Jamf

December 1, 2025
Land a Cybersecurity Job in 2026

Land a Cybersecurity Job in 2026

November 27, 2025
10 tips to Stay Safe Online that anyone can use – Sophos News

10 tips to Stay Safe Online that anyone can use – Sophos News

October 13, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested