COLDRIVER APT Group Uses ClickFix Tactics to Deliver BAITSWITCH and SIMPLEFIX Malware
Summary
Hide ▲
Show ▼
The COLDRIVER APT group, also known as Star Blizzard, has intensified its operations since May 2025, rapidly developing and refining its malware arsenal. The group has launched a new campaign using ClickFix tactics to deliver three new malware families: NOROBOT, YESROBOT, and MAYBEROBOT. These malware families are connected via a delivery chain and target individuals and organizations connected to Russia, including NGOs, human rights defenders, and think tanks. The attack chain involves tricking victims into running a malicious DLL via a fake CAPTCHA check, leading to the deployment of the SIMPLEFIX backdoor. The malware exfiltrates specific file types and establishes communication with a command-and-control server. The campaign aligns with COLDRIVER's known victimology, focusing on civil society members connected to Russia. The group has been active since 2019, using spear-phishing and custom tools like SPICA and LOSTKEYS. The latest campaign demonstrates the group's continued use of effective infection vectors, despite their lack of technical sophistication. The malware families NOROBOT and MAYBEROBOT are tracked by Zscaler ThreatLabz under the names BAITSWITCH and SIMPLEFIX, respectively. The COLDRIVER group has been deploying the new malware set more aggressively than any previous campaigns. The new malware set replaces the previous primary malware LOSTKEYS, which has not been observed since its public disclosure in May 2025. The attack starts with a 'ClickFix-style' phishing lure, a fake CAPTCHA page designed to trick the victim into thinking they must verify they’re 'not a robot'. The malware uses a split-key cryptography scheme, with parts of the decryption key hidden in downloaded files and the Windows Registry. The malware fetches a self-extracting Python 3.8 installer, two encrypted Python scripts, and a scheduled task to ensure persistence. The Python scripts are combined to decrypt and launch a minimal Python-based first-stage backdoor that communicates with a hardcoded command-and-control (C2) server. The COLDRIVER group abandoned YESROBOT after just two weeks due to its cumbersome and easily detectable nature. The COLDRIVER group switched to MAYBEROBOT, a more flexible PowerShell-based backdoor, around June 2025. MAYBEROBOT uses a custom C2 protocol with commands to download and execute files, run commands via cmd.exe, and execute PowerShell blocks. The COLDRIVER group has been constantly evolving the NOROBOT malware to evade detection systems. The group has been using the NOROBOT and MAYBEROBOT malware families on targets previously compromised through phishing to acquire additional intelligence value from information on their devices directly. The PhantomCaptcha campaign targeted Ukrainian regional government administration and organizations critical for the war relief effort, including the International Committee of the Red Cross, UNICEF, and various NGOs. The campaign began on October 8, 2025, and used a malicious "I am not a robot" CAPTCHA challenge to execute a PowerShell command, installing malware on victims' systems. The malware operated in three stages: a downloader script, a reconnaissance module, and a WebSocket-based RAT. The campaign's infrastructure was active for just one day, with backend servers remaining online to manage infected devices. The PhantomCaptcha campaign is linked to a wider operation involving malicious Android apps disguised as adult entertainment or cloud storage services.
Timeline
-
21.10.2025 10:29 4 articles · 2d ago
COLDRIVER Develops and Deploys YESROBOT and MAYBEROBOT Malware
The COLDRIVER group abandoned YESROBOT after just two weeks due to its cumbersome and easily detectable nature. The COLDRIVER group switched to MAYBEROBOT, a more flexible PowerShell-based backdoor, around June 2025. MAYBEROBOT uses a custom C2 protocol with commands to download and execute files, run commands via cmd.exe, and execute PowerShell blocks. The COLDRIVER group has been using the NOROBOT and MAYBEROBOT malware families on targets previously compromised through phishing to acquire additional intelligence value from information on their devices directly. The COLDRIVER group initially used a Python backdoor dubbed YesRobot, which had limited functionality and made typical backdoor functionality cumbersome to implement. The COLDRIVER group abandoned YesRobot in favor of a new backdoor, MaybeRobot, also deployed via NoRobot. The COLDRIVER group has been making multiple changes to NoRobot, mainly focused on evading detection, and updating its infection chain as it transitioned to deploying MaybeRobot as the final stage.
Show sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
26.09.2025 15:45 7 articles · 27d ago
COLDRIVER Launches New Campaign Using BAITSWITCH and SIMPLEFIX Malware
The PhantomCaptcha campaign began on October 8, 2025, targeting Ukrainian relief organizations with phishing emails containing a malicious PDF. The PDF directed victims to a fake Zoom site hosted on Russian infrastructure, which executed a PowerShell command to install malware. The malware operated in three stages: a downloader script, a reconnaissance module, and a WebSocket-based RAT. The campaign's infrastructure was active for just one day, with backend servers remaining online to manage infected devices. The operation is linked to a wider campaign involving malicious Android apps.
Show sources
- New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks — thehackernews.com — 26.09.2025 15:45
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
Information Snippets
-
COLDRIVER, also known as Callisto, Star Blizzard, and UNC4057, is a Russia-linked threat actor active since 2019.
First reported: 26.09.2025 15:454 sources, 5 articlesShow sources
- New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks — thehackernews.com — 26.09.2025 15:45
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The new campaign uses ClickFix tactics to deliver BAITSWITCH and SIMPLEFIX malware.
First reported: 26.09.2025 15:454 sources, 6 articlesShow sources
- New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks — thehackernews.com — 26.09.2025 15:45
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
-
BAITSWITCH is a downloader that fetches the SIMPLEFIX PowerShell backdoor.
First reported: 26.09.2025 15:453 sources, 4 articlesShow sources
- New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks — thehackernews.com — 26.09.2025 15:45
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The attack chain involves a fake CAPTCHA check to trick victims into running a malicious DLL.
First reported: 26.09.2025 15:454 sources, 6 articlesShow sources
- New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks — thehackernews.com — 26.09.2025 15:45
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
-
SIMPLEFIX establishes communication with a command-and-control server to execute PowerShell scripts and commands.
First reported: 26.09.2025 15:453 sources, 4 articlesShow sources
- New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks — thehackernews.com — 26.09.2025 15:45
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
-
The campaign targets members of NGOs, human rights defenders, think tanks, and individuals connected to Russia.
First reported: 26.09.2025 15:454 sources, 5 articlesShow sources
- New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks — thehackernews.com — 26.09.2025 15:45
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The malware exfiltrates specific file types from pre-configured directories, similar to the LOSTKEYS malware.
First reported: 26.09.2025 15:452 sources, 3 articlesShow sources
- New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks — thehackernews.com — 26.09.2025 15:45
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
-
The COLDRIVER group has been rapidly developing and refining its malware arsenal since May 2025.
First reported: 21.10.2025 10:294 sources, 4 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The new malware families, NOROBOT, YESROBOT, and MAYBEROBOT, are connected via a delivery chain.
First reported: 21.10.2025 10:294 sources, 4 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The new attack waves use ClickFix-style lures to trick users into running malicious PowerShell commands.
First reported: 21.10.2025 10:294 sources, 4 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The malware families NOROBOT and MAYBEROBOT are tracked by Zscaler ThreatLabz under the names BAITSWITCH and SIMPLEFIX, respectively.
First reported: 21.10.2025 10:293 sources, 3 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The new infection chain commences with an HTML ClickFix lure called COLDCOPY.
First reported: 21.10.2025 10:293 sources, 3 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
-
YESROBOT uses HTTPS to retrieve commands from a hard-coded command-and-control server.
First reported: 21.10.2025 10:294 sources, 4 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
MAYBEROBOT is more flexible and extensible, equipped with features to download and run payloads from specified URLs.
First reported: 21.10.2025 10:294 sources, 4 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER actors rushed to deploy YESROBOT as a stopgap mechanism before switching to MAYBEROBOT.
First reported: 21.10.2025 10:294 sources, 4 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The use of NOROBOT and MAYBEROBOT is likely reserved for significant targets already compromised via phishing.
First reported: 21.10.2025 10:293 sources, 3 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
NOROBOT and its infection chain have undergone constant evolution to evade detection systems.
First reported: 21.10.2025 10:293 sources, 3 articlesShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The Netherlands' Public Prosecution Service suspects three 17-year-old men of providing services to a foreign government, potentially linked to COLDRIVER.
First reported: 21.10.2025 10:291 source, 1 articleShow sources
- Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers — thehackernews.com — 21.10.2025 10:29
-
The COLDRIVER group has been deploying the new malware set more aggressively than any previous campaigns.
First reported: 21.10.2025 13:023 sources, 3 articlesShow sources
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The new malware set replaces the previous primary malware LOSTKEYS, which has not been observed since its public disclosure in May 2025.
First reported: 21.10.2025 13:023 sources, 3 articlesShow sources
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The attack starts with a 'ClickFix-style' phishing lure, a fake CAPTCHA page designed to trick the victim into thinking they must verify they’re 'not a robot'.
First reported: 21.10.2025 13:023 sources, 4 articlesShow sources
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
-
The malware uses a split-key cryptography scheme, with parts of the decryption key hidden in downloaded files and the Windows Registry.
First reported: 21.10.2025 13:023 sources, 4 articlesShow sources
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
-
The malware fetches a self-extracting Python 3.8 installer, two encrypted Python scripts, and a scheduled task to ensure persistence.
First reported: 21.10.2025 13:023 sources, 4 articlesShow sources
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
-
The Python scripts are combined to decrypt and launch a minimal Python-based first-stage backdoor that communicates with a hardcoded command-and-control (C2) server.
First reported: 21.10.2025 13:023 sources, 4 articlesShow sources
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
-
The COLDRIVER group abandoned YESROBOT after just two weeks due to its cumbersome and easily detectable nature.
First reported: 21.10.2025 13:023 sources, 3 articlesShow sources
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group switched to MAYBEROBOT, a more flexible PowerShell-based backdoor, around June 2025.
First reported: 21.10.2025 13:023 sources, 3 articlesShow sources
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
MAYBEROBOT uses a custom C2 protocol with commands to download and execute files, run commands via cmd.exe, and execute PowerShell blocks.
First reported: 21.10.2025 13:023 sources, 3 articlesShow sources
- Russian Coldriver Hackers Deploy New 'NoRobot' Malware — www.infosecurity-magazine.com — 21.10.2025 13:02
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group has been constantly evolving the NOROBOT malware to evade detection systems.
First reported: 21.10.2025 18:132 sources, 2 articlesShow sources
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group has been using the NOROBOT and MAYBEROBOT malware families on targets previously compromised through phishing to acquire additional intelligence value from information on their devices directly.
First reported: 21.10.2025 18:132 sources, 2 articlesShow sources
- Russian hackers evolve malware pushed in "I am not a robot" captchas — www.bleepingcomputer.com — 21.10.2025 18:13
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group, also known as Star Blizzard, Callisto, ColdRiver, Seaborgium, and UNC4057, has been active since at least 2019 and is publicly linked to Russia's Federal Security Service (FSB).
First reported: 22.10.2025 15:031 source, 1 articleShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group has been using a new backdoor in attacks after its LOSTKEYS malware was detailed in a public report in June 2025.
First reported: 22.10.2025 15:031 source, 1 articleShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group started using new malware families within days of the public disclosure of LOSTKEYS and never deployed LOSTKEYS again.
First reported: 22.10.2025 15:031 source, 1 articleShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group dropped the PowerShell infection chain, opting instead to rely on the victim's execution of a malicious DLL via rundll32.
First reported: 22.10.2025 15:031 source, 1 articleShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group has been using the ClickFix technique to deliver the LOSTKEYS malware as part of a multi-stage infection chain that also involved the use of a first-stage PowerShell script.
First reported: 22.10.2025 15:032 sources, 2 articlesShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
-
The COLDRIVER group has been luring victims to pages masquerading as information resources for members of civil society and think tanks in Russia and convincing them to execute malicious commands in the Windows Run box.
First reported: 22.10.2025 15:032 sources, 2 articlesShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
-
The COLDRIVER group has been using a malicious DLL, dubbed NoRobot by Google and BaitSwitch by Zscaler, to retrieve the next-stage payload and achieve persistence.
First reported: 22.10.2025 15:032 sources, 2 articlesShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
-
The COLDRIVER group initially used a Python backdoor dubbed YesRobot, which had limited functionality and made typical backdoor functionality cumbersome to implement.
First reported: 22.10.2025 15:031 source, 1 articleShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group abandoned YesRobot in favor of a new backdoor, MaybeRobot, also deployed via NoRobot.
First reported: 22.10.2025 15:031 source, 1 articleShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group has been making multiple changes to NoRobot, mainly focused on evading detection, and updating its infection chain as it transitioned to deploying MaybeRobot as the final stage.
First reported: 22.10.2025 15:031 source, 1 articleShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The COLDRIVER group has been rotating infrastructure and file naming conventions, paths where files were retrieved from, how those paths were constructed, changing the export name and changing the DLL name.
First reported: 22.10.2025 15:031 source, 1 articleShow sources
- Russian APT Switches to New Backdoor After Malware Exposed by Researchers — www.securityweek.com — 22.10.2025 15:03
-
The PhantomCaptcha campaign targeted Ukrainian regional government administration and organizations critical for the war relief effort, including the International Committee of the Red Cross, UNICEF, and various NGOs.
First reported: 22.10.2025 16:372 sources, 2 articlesShow sources
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The campaign started and ended on October 8, 2025, and involved significant infrastructure setup, with some domains registered at the end of March 2025.
First reported: 22.10.2025 16:372 sources, 2 articlesShow sources
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The attack used emails impersonating the Ukrainian President’s Office, carrying malicious PDF attachments that linked to a domain impersonating the Zoom communication platform.
First reported: 22.10.2025 16:372 sources, 2 articlesShow sources
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The attack involved a WebSocket Remote Access Trojan (RAT) capable of remote command execution and data exfiltration through base64-encoded JSON commands.
First reported: 22.10.2025 16:372 sources, 2 articlesShow sources
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The campaign was linked to a subsequent operation targeting users in Lviv, Ukraine, with adult-themed Android APKs or cloud storage tools acting as spyware.
First reported: 22.10.2025 16:372 sources, 2 articlesShow sources
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The WebSocket RAT was hosted on Russian infrastructure, and the adult-themed campaign may be related to Russia/Belarus source development.
First reported: 22.10.2025 16:372 sources, 2 articlesShow sources
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The PhantomCaptcha campaign used a malicious "I am not a robot" CAPTCHA challenge similar to those used by the COLDRIVER group.
First reported: 22.10.2025 16:372 sources, 2 articlesShow sources
- PhantomCaptcha ClickFix attack targets Ukraine war relief orgs — www.bleepingcomputer.com — 22.10.2025 16:37
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The PhantomCaptcha campaign began on October 8, 2025, targeting Ukrainian relief organizations with phishing emails.
First reported: 22.10.2025 18:451 source, 1 articleShow sources
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The phishing emails contained a malicious PDF that directed victims to a fake Zoom site hosted on Russian infrastructure.
First reported: 22.10.2025 18:451 source, 1 articleShow sources
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The attack used a Cloudflare verification page to execute a PowerShell command, installing malware on victims' systems.
First reported: 22.10.2025 18:451 source, 1 articleShow sources
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The malware operated in three stages: a downloader script, a reconnaissance module, and a WebSocket-based RAT.
First reported: 22.10.2025 18:451 source, 1 articleShow sources
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The campaign's infrastructure was active for only one day, with backend servers remaining online to manage infected devices.
First reported: 22.10.2025 18:451 source, 1 articleShow sources
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
-
The PhantomCaptcha campaign is linked to a wider operation involving malicious Android apps disguised as adult entertainment or cloud storage services.
First reported: 22.10.2025 18:451 source, 1 articleShow sources
- PhantomCaptcha Campaign Targets Ukraine Relief Organizations — www.infosecurity-magazine.com — 22.10.2025 18:45
Similar Happenings
Increased Use of ClickFix Attacks by Threat Actors
ClickFix attacks, where users are tricked into running malicious commands by copying code from a webpage, have become a significant source of security breaches. These attacks are used by various threat actors, including the Interlock ransomware group and state-sponsored APTs. Recent data breaches at Kettering Health, DaVita, City of St. Paul, and Texas Tech University Health Sciences Centers have been linked to ClickFix-style tactics. The attacks exploit user behavior and technical gaps in detection to evade security measures and compromise systems. They are delivered through SEO poisoning, malvertising, and other non-email vectors, making them harder to detect and prevent. Effective defense against ClickFix attacks requires browser-based detection and blocking to intercept these threats at the earliest opportunity.
UNC5142 Abuses Blockchain Smart Contracts to Spread Malware via Compromised WordPress Sites
A financially motivated threat actor, UNC5142, has been exploiting blockchain smart contracts to distribute information stealers such as Atomic, Lumma, Rhadamanthys, and Vidar on Windows and macOS systems. The attacks leverage compromised WordPress websites and a technique called 'EtherHiding' to hide malicious code on public blockchains. The campaign uses a multi-stage JavaScript downloader named CLEARSHORT to deliver malware, with the first stage interacting with a malicious smart contract on the BNB Smart Chain. The smart contract retrieves a landing page from an external server, which then employs social engineering tactics to infect the system. Google Threat Intelligence Group (GTIG) flagged about 14,000 web pages containing injected JavaScript associated with UNC5142, indicating a broad targeting of vulnerable WordPress sites. However, no activity has been observed since July 23, 2025.
Velociraptor DFIR Tool Abused in LockBit and Babuk Ransomware Campaigns
Threat actors, assessed to be China-based Storm-2603, have started using the Velociraptor digital forensics and incident response (DFIR) tool in ransomware attacks deploying LockBit and Babuk ransomware. The attackers exploited a privilege escalation vulnerability in an outdated version of Velociraptor to gain persistent access and control over virtual machines. The campaign involved creating local admin accounts, disabling security features, and using fileless PowerShell encryptors for data exfiltration and encryption. The ransomware deployed on Windows systems was identified as LockBit, while a Linux binary detected as Babuk ransomware was found on VMware ESXi systems. Storm-2603 initially exploited SharePoint vulnerabilities in July 2025 and deployed Warlock, LockBit, and Babuk ransomware on VMware ESXi servers in August 2025. Sophos CTU researchers first documented Velociraptor abuse by Storm-2603 on August 5, 2025. Storm-2603 used the ToolShell exploit to gain initial access and deployed an outdated version of Velociraptor (version 0.73.4.0) that is susceptible to a privilege escalation vulnerability (CVE-2025-6264) to enable arbitrary command execution and endpoint takeover. The group also used Smbexec to remotely launch programs using the SMB protocol and modified Active Directory (AD) Group Policy Objects (GPOs) to disable real-time protection. Storm-2603 established the infrastructure for the AK47 C2 framework in March 2025 and created the first prototype of the tool the next month. The group pivoted from LockBit-only deployment to dual LockBit/Warlock deployment in April 2025 and used the ToolShell exploit as a zero-day in July 2025. Storm-2603 demonstrated operational flexibility and sophisticated builder expertise using leaked and open-source ransomware frameworks.
FileFix Attack Evolves with Cache Smuggling Technique
A new variant of the FileFix social engineering attack uses cache smuggling to evade security software. This technique involves hiding a malicious ZIP archive within a browser's cache to bypass detection. The attack impersonates a Fortinet VPN Compliance Checker and tricks users into executing a PowerShell script through the Windows File Explorer address bar. The script extracts the malicious payload from the cache and executes it. This new variant was first observed by cybersecurity researcher P4nd3m1cb0y and detailed by Marcus Hutchins of Expel. The attack has been adopted by various threat actors, including ransomware groups. Additionally, a new ClickFix kit called the IUAM ClickFix Generator has been discovered, which automates the creation of ClickFix-style lures.
WordPress Sites Exploited for ClickFix Phishing Attacks
WordPress sites are being exploited to inject malicious JavaScript that redirects users to phishing pages. The attacks use a theme-related file to load a dynamic payload from a remote server, which includes a JavaScript file and a hidden iframe mimicking legitimate Cloudflare assets. The domain involved is part of a traffic distribution system (TDS) known as Kongtuke. The campaign highlights the need for securing WordPress sites and keeping software up-to-date. Additionally, a new phishing kit named IUAM ClickFix Generator allows attackers to create customizable phishing pages mimicking browser verification challenges. This kit has been used to deploy information stealers like DeerStealer and Odyssey Stealer. The emergence of such tools lowers the barrier to entry for cybercriminals, enabling sophisticated, multi-platform attacks. A new ClickFix campaign employs cache smuggling to evade detection, using the browser's cache to store malicious data without downloading files or communicating with the internet. The attack masquerades as a Fortinet VPN Compliance Checker, executing an obfuscated payload via a PowerShell script.