Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Trump’s anti-DEI push won’t stop black Kentucky alumni from holding off-campus celebrations

OPEC+ is in the oil price war – here’s what the cartel wants

Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Russian hacker deploying new Lostkeys malware using Clickfix FakeCaptcha
Identity

Russian hacker deploying new Lostkeys malware using Clickfix FakeCaptcha

userBy userMay 8, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LostKeys Malware

A Russian-related threat actor known as Coldriver has been observed to distribute new malware called LostKeys as part of a spy-centric campaign using social engineering lures like Clickfix.

“LostKeys can steal files from hardcoded lists of extensions and directories, and can send system information and running processes to attackers.”

The malware was observed in January, March and April 2025 in attacks on Western governments, the military, and current and former advisors against journalists, think tanks and NGOs, according to the company. Additionally, individuals connected to Ukraine are also chosen.

LostKeys is the second custom malware that stems from the Coldriver after Spica, marking a continuous deviation from the phishing campaigns of the qualifications that threat actors are known to. Hacking groups are also tracked by the names Callisto, Star Blizzard, and UNC4057.

Cybersecurity

“They are known to steal qualifications, and after accessing the target account, they remove emails and steal contact lists from the compromised account,” said security researcher Wesley Shields. “If you choose, Coldriver may attempt to distribute malware to the target device and access files on the system.”

The latest series of attacks starts with a decoy website that contains a fake Captcha verification prompt. Victims are instructed to paste a Powershell command copied into Clipboard, a widely popular social engineering technique called Clickfix, into Clickfix, open the Windows Run dialog and paste the PowerShell command.

The PowerShell command is designed to download and run the following payload from a remote server (“165.227.148[.]68”), acts as a three-stage downloader, but not before running the check in any possible effort to avoid running on the virtual machine.

The third stage payload, a base64 encoded blob, is decoded into a PowerShell script responsible for running the lost keys of compromised hosts, allowing threat actors to collect files from hardcoded lists of extensions and directories, run the process and collect files.

Malware is rated as being deployed selectively, as in the case of SPICA. It demonstrates the highly targeted nature of these attacks.

Google also said it had discovered additional Lostkeys artifacts dating back to December 2023, spoofing a binary related to the Maltego open source research platform. It is unclear whether these samples have something to do with Coldriver or whether the malware has been reused by threat actors since January 2025.

Clickfix adoption continues to grow

This development is because Clickfix continues to be steadily adopted by multiple threat actors, distributing a wide range of malware families, including bank Trojans called Lampion and Atomic Stealer.

Every Palo Alto Networks Unit 42, attack Lampion propagation and use a phishing email with ZIP file attachments as lures. HTML files residing in the ZIP archive will use ClickFix instructions to launch the Multi stage infection process to redirect message recipients to a fake landing page.

“Another interesting aspect of Lampion’s infection chain is that it is divided into several non-continuous stages that are carried out as separate processes,” Unit 42 said. “This distributed execution complicates detection because the attack flow does not form a process tree that is easily identifiable. Instead, it consists of a complex chain of individual events, some of which may appear benign on their own.”

Malicious campaigns target Portuguese-speaking individuals and organizations in a variety of areas, including government, finance and transportation.

Cybersecurity

Over the last few months, the Clickfix strategy has been combined with another sleazy tactic called EtherHiding, which uses Binance’s Smart Chain (BSC) contract to hide the payload of the next stage, eventually leading to the delivery of a MacOS information steeler called Atomic Stealer.

Clicking “I’m Not a Robot” will trigger a Binance Smart Contract using ether hiding techniques to deliver base64-encoded commands to the clipboard. This prompts the user to run in the terminal via a Macos-specific shortcut (⌘+Space, ⌘+V). “This command downloads a script that retrieves and executes a signed MACH-O binaries confirmed as an atomic stealer.”

Further investigations have shown that the campaign likely compromised around 2,800 legitimate websites to serve fake capture prompts. The large-scale watering hole attack has been called MacReaper by researchers.

“This attack will maximize infection by leveraging unforeseen JavaScript, three full-screen IFRAMEs and a blockchain-based command infrastructure,” the researchers added.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleInstacart CEO Fidji Simo is joining Openai
Next Article North Korea launches missiles off the east coast, South Korea says | Military News
user
  • Website

Related Posts

Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases

May 8, 2025

SONICWALL Patch 3 flaws in SMA 100 devices allow attackers to execute code as root

May 8, 2025

Qilin ransomware ranked best in April 2025 with over 45 data leak disclosures

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Trump’s anti-DEI push won’t stop black Kentucky alumni from holding off-campus celebrations

OPEC+ is in the oil price war – here’s what the cartel wants

Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases

US-UK Trade Contract: How is Trump’s global tariff talks formed? | International Trade News

Trending Posts

US-UK Trade Contract: How is Trump’s global tariff talks formed? | International Trade News

May 8, 2025

Bill Gates says he will hand out 99% of his wealth by 2045 | Charity News

May 8, 2025

Ukrainian parliament criticizes contracts with us for landmark mineral trade in Russia-Ukraine War News

May 8, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Did Figma kill Webflow and Framer with the release of the Figma site?

Metaworld Congress 2025: Madrid Takes Center Stage in Digital Innovation

Coinbase wins DeRibit for $2.9 billion and earns a major push to crypto derivatives

Former Synapse CEO resurfaces with new humanoid robot startup aiming to valuate $1 billion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.