Stop overpaying - start transferring money with Ogvio. Join the waitlist & grab early Rewards NOW! 🎁
Google Threat Intelligence Exposes COLDRIVER’s New LOSTKEYS Malware
Key Takeaways
- Google reports COLDRIVER is using LOSTKEYS malware to steal documents from Western organizations;
- LOSTKEYS spreads through fake CAPTCHA sites, clipboard scripts, and avoids security software;
- Google added the fake sites to Safe Browsing and urges extra monitoring to catch threats early.
A new report from Google Threat Intelligence, published on May 7, shows that the hacking group COLDRIVER is using a tool called LOSTKEYS to steal documents from Western organizations.
The malware installation process follows four main steps. First, users are directed to a fake website that displays a false CAPTCHA screen. After interacting with it, a script is placed into the user’s clipboard.
The malware then checks the device for signs of security software and tries to avoid detection. In the final step, it downloads and installs the main program.
Did you know?
Subscribe - We publish new crypto explainer videos every week!
Best Crypto Analysis Indicators Explained (Beginner-Friendly Animation)
LOSTKEYS collects files from various folders and extensions. It also gathers information about the system and active programs and sends it back to COLDRIVER. Google Threat Intelligence identified the server used for these activities as "165.227.148.68".
Google Threat Intelligence has added the fake websites involved in this attack to its "Safe Browsing" feature to help protect users. The company has also recommended monitoring clipboard activity, checking PowerShell usage, and limiting unknown outgoing network connections as ways to catch similar threats early.
COLDRIVER is linked to Russian interests and has a history of targeting former diplomats, journalists, and other well-known figures. In January 2024, the group used another piece of malware, called Spica, that could run remote commands and move files between infected computers.
LOSTKEYS shows that the group focuses on methods that do not rely only on stealing passwords.
Recently, North Korean hackers known as Contagious Interview created fake cryptocurrency consulting firms. How does the scam work? Read the full story.