Google Identifies New Malware Linked to Russia-Based Hacking Group
Alphabet's Google has made a significant discovery in the world of cybersecurity, identifying a new malware strain called "LOSTKEYS" that is linked to the notorious Russian-based hacking group Cold River. This latest development marks a notable addition to the toolset of Cold River, a group known for its sophisticated and targeted attacks against high-profile targets.
According to Wesley Shields, a researcher with Google Threat Intelligence Group, the LOSTKEYS malware represents a new level of sophistication in the capabilities of Cold River. "This malware marks a new development in the toolset" of Cold River, Shields said in a blog post. The group is primarily known for stealing login credentials from high-profile targets, including those within NATO governments, non-governmental organizations, and former intelligence and diplomatic officers.
The central goal of Cold River's campaigns has always been to collect intelligence in support of Russian strategic interests. In recent months, the group has targeted a range of individuals and organizations, including current and former advisers to Western governments and militaries, journalists, think tanks, and NGOs, as well as unnamed individuals connected to Ukraine.
Recent targets observed by Google include current and former advisers to Western governments and militaries, as well as journalists, think tanks, and NGOs. The group has also targeted individuals connected to Ukraine, highlighting the growing tensions between Russia and Ukraine in recent years.
Previous high-profile campaigns have included targeting three nuclear research laboratories in the US in the summer of 2022 and publishing the private emails of former British spymaster Richard Dearlove, alongside pro-Brexit individuals. These operations were revealed in May 2022 and demonstrate the group's ability to infiltrate sensitive networks and extract valuable intelligence.
Google's identification of the LOSTKEYS malware is a significant development in the ongoing battle against cyber threats. As we move forward, it is essential that organizations and individuals take proactive steps to protect themselves from these types of attacks. By staying informed and vigilant, we can reduce our risk of falling victim to these sophisticated hacking campaigns.