Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Turning lignocellulosic biomass into sustainable fuel for transportation

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

Nominations now being accepted for the 2026 Startup Battlefield 200 | Tech Crunch

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack
Identity

New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack

userBy userSeptember 26, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The Russian Advanced Persistent Threat (APT) group known as Coldriver is attributed to a Clickfix-style fresh attack designed to provide two new “lightweight” malware families tracked as Baitswitch and Simplefix.

Zscaler Threatlabz, which detected a new multi-stage click fix campaign earlier this month, described Baitswitch as a downloader that ultimately drops SimpleFix, a PowerShell backdoor.

Tracked also as Callisto, Star Blizzard and UNC4057, Coldriver is a moniker assigned to Russia-related threat actors known to target a wide range of sectors since 2019.

The use of enemy Clickfix tactics will use fake sites previously documented by Google Threat Intelligence Group (GTIG) in May 2025 and use fake sites that provide fake Captcha verification prompts to trick victims and run PowerShell commands designed to provide LostKeys Visual Basic Script.

DFIR Retainer Service

“The ongoing use of Clickfix suggests that it is an effective infection vector, even if it is not innovative or technologically advanced,” Zscaler security researchers Sudeep Singh and Yin Hong Chang said in a report released this week.

The latest attack chain follows the same trick and forces unsuspecting users to run malicious DLLs in the Windows Run dialog, pose as if they complete a Captcha check. dll, baitswitch reaches out to domains managed by attackers (“Captchanom[.]TOP “) To get SimpleFix backdoor, a decoy document hosted on Google Drive will be presented to the victim.

It also makes several HTTP requests to the same server to send system information, receives commands that establish persistence, stores the encrypted payload in the Windows registry, downloads PowerShell Stager, clears the latest commands executed in the Run dialog, and effectively erases traces of ClickFix attacks that caused the infection.

The downloaded PowerShell Stager then reaches out to the external server (“SouthProveSolutions[.]com”) Download SimpleFix. This establishes communication with the Command and Control (C2) server and runs PowerShell scripts, commands, and binaries hosted at the remote URL.

One of the PowerShell scripts executed in SimpleFix Exftrate is run through information about a hard-coded list of file types in a list of pre-configured directories. The directory listing and file extension list overlap with the LostKeys stock.

“The Coldriver APT Group is known for targeting NGO members, human red defenders, think tanks in the western region, and individuals who have been exiled and resident in Russia,” Zscaler said. “The focus of this campaign is closely aligned with the victims targeting members of civil society associated with Russia.”

The BO team and the target Russia

The development is developing as Kaspersky said in early September that a new phishing campaign targeting Russian companies, conducted by the BO Team Group (aka Black Owl, Hoody Hyena, Lifting Zmiy) used a password-protected RAR archive to provide a new version of Brockendoor Rewrith and an updated version of Zeronetkit.

Golang Backdoor’s Zeronetkit supports remote access to compromised hosts, features to upload/download files, run commands using CMD.exe and create TCP/IPv4 tunnels. The new version you select also includes support for downloading and running shellcode, updating the communication interval with C2 and modifying the C2 server list.

“Because Zeronetkit cannot be independently sustained on infected systems, attackers will use Brockendoor to copy downloaded backdoors to startups,” the Russian cybersecurity vendor said.

It also follows the emergence of a new group called Bearlyfy, which used ransomware stocks such as Lockbit 3.0 and Babuk in attacks targeting Russia in Russia-targeted attacks. As of August 2025, the group is estimated to have claimed at least 30 victims.

CIS Build Kit

One incident targeting consulting firms has been observed to weaponize vulnerable versions of Bitrix for initial access, then escalating privileges using Zerorologon’s flaws. Another case observed in July is said to have been promoted through an unknown partner.

“In the latest recorded attacks, the attackers demanded 80,000 euros in cryptocurrency, but in the first attack the ransom was thousands of dollars,” F6 researchers said. “On average, all fifth victims buy decryptors from the attacker because of their relative low ransom.”

Bearlyfy has been rated active since January 2025, and a deeper analysis of its tool has overlapping with a potentially ukrain threat group called Phantomcore, where infrastructure is likely to overlap.

“Phantomcore implements the complex multi-stage attacks typical of APT campaigns,” the company said. “On the other hand, Bearlyfy uses a different model. It uses attacks with a targeted focus on achieving minimal preparation and immediate effect. Initial access is achieved through the use of external services and vulnerable applications. The main toolkits are intended to be encryption, destruction, or data correction.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSierra Space spacecraft faces reinvention after NASA contract changes
Next Article Battery startup Moxion has gone bankrupt. Now its founder is back to “finishing what we started.”
user
  • Website

Related Posts

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

February 9, 2026

How top CISOs can overcome burnout and speed up MTTR without hiring more people

February 9, 2026

Bloody Wolf uses NetSupport RAT in spear phishing campaign to target Russian Uzbekistan

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Turning lignocellulosic biomass into sustainable fuel for transportation

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

Nominations now being accepted for the 2026 Startup Battlefield 200 | Tech Crunch

Advanced materials made in space could benefit UK industry

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.