Introduction
The emergence of the sophisticated malware strain LOSTKEYS, attributed to the Russian state-aligned hacking group COLDRIVER [8], marks a significant escalation in cyber-espionage activities [2]. This malware, linked to Russia’s Federal Security Service (FSB) [2] [9], is designed for data exfiltration [7] [9], targeting high-profile entities across Europe and North America. Its deployment underscores the evolving nature of cyber threats and the necessity for robust cybersecurity measures against state-sponsored actors [5].
Description
A sophisticated malware strain named LOSTKEYS [2], attributed to the Russian state-aligned hacking group COLDRIVER (also known as Cold River, UNC4057 [3] [4] [5] [8] [10], Star Blizzard [1] [3] [4] [5] [7] [8], and Callisto) [3] [4] [5] [8], has been identified as part of a series of cyber-attacks linked to Russia’s Federal Security Service (FSB). Active since at least early 2025, LOSTKEYS represents a significant escalation in COLDRIVER’s cyber-espionage capabilities [2], specifically designed for data exfiltration [7] [9], with a focus on stealing credentials, sensitive documents [1] [2] [7], and communications [1] [7] [9]. The malware primarily targets high-profile entities, including diplomatic institutions [1] [7], defense contractors [1] [7], and critical infrastructure in Europe and North America [1] [7], as well as organizations associated with Ukraine or Western governments [10], such as NATO affiliates [9], journalists [2] [4] [5] [8] [9] [10], think tanks [2] [4] [8], NGOs [2] [3] [4] [5] [6] [8] [9] [10], and various government and military personnel [9]. With a critical threat score of 9.2/10, its impact has been substantial, with reports of intellectual property theft and unauthorized access to sensitive communications [7].
LOSTKEYS employs a complex [1] [6] [10], multi-stage infection process that begins with targeted spear-phishing campaigns utilizing deceptive emails containing malicious document attachments. These emails often masquerade as communications from trusted sources [9], such as government agencies or partners, regarding urgent geopolitical issues [9]. Upon opening these attachments [1] [7], the malware triggers a multi-stage infection process [1], establishing persistence on the victim’s system while evading conventional security measures [1]. One method includes a lure website featuring a fake CAPTCHA; once the CAPTCHA is “verified,” PowerShell commands are copied to the user’s clipboard [3], prompting execution. This initial PowerShell script fetches subsequent stages of the malware from a specified IP address [3]. The malware propagates by exploiting undisclosed vulnerabilities in widely-used office productivity software and employs device evasion tactics to avoid detection in virtual environments.
The second stage of the infection includes a VM evasion mechanism that performs environment checks, such as verifying the MD5 hash of the display resolution against known sandbox profiles. If the execution continues [8], the third stage downloads and decodes the final payload [6], which is a Base64-encoded Visual Basic Script (VBS) that executes the main LOSTKEYS payload. The malware utilizes obfuscated VBA macros and modifies the registry and scheduled tasks to maintain persistence. Each infection chain is customized with unique identifiers and encryption keys [6]. The malware communicates with command servers using encrypted channels that mimic legitimate HTTPS traffic [7], complicating detection through network monitoring [7].
The deployment of LOSTKEYS is believed to occur primarily in high-value scenarios [6], with many victims remaining unaware of the malware’s presence for extended periods [7], allowing attackers to maintain persistent access and continuously harvest valuable data [7]. Analysts view the emergence of LOSTKEYS as part of a broader strategy by state-aligned threat actors to destabilize foreign policymaking and gain insights into defense strategies [2], coinciding with increased cyber tensions between Western nations and Russia amid ongoing global conflicts [2]. Security agencies have issued alerts regarding this evolving threat [1] [7], highlighting COLDRIVER’s advancements in capabilities and tactics [7], which align with Russian strategic intelligence priorities [7].
To protect potential targets [6], users are urged to enroll in Google’s Advanced Protection Program and enable Enhanced Safe Browsing in Chrome [6]. Measures have been implemented to disrupt the campaign [8], including adding identified malicious websites and files to Safe Browsing [5], blocking malicious domains [4] [8], and alerting affected users [3] [8]. For enterprise defenders [8], enforcing least privilege policies and disabling script execution by default are critical mitigations against ClickFix-style attacks [8]. Google’s Threat Intelligence Group has integrated findings related to LOSTKEYS into Safe Browsing and has issued alerts to affected Gmail and Workspace users [6]. Continuous monitoring for indicators of compromise (IoCs) and proactive threat hunting in vulnerable sectors are recommended to mitigate risks associated with this malware [9]. The emergence of LOSTKEYS underscores the evolving nature of cyber threats and the necessity for robust cybersecurity measures against state-sponsored actors [5].
Conclusion
The impact of LOSTKEYS has been substantial, with significant intellectual property theft and unauthorized access to sensitive communications [7]. Mitigation efforts include enrolling in advanced protection programs, enabling enhanced safe browsing [5] [6] [8], and implementing least privilege policies. The emergence of LOSTKEYS highlights the need for continuous monitoring and proactive threat hunting to counteract the evolving tactics of state-sponsored cyber threats. As cyber tensions between Western nations and Russia persist [2], robust cybersecurity measures remain crucial in safeguarding against such sophisticated attacks.
References
[1] https://cybermaterial.com/coldriver-hackers-target-sensitive-data/
[2] https://the420.in/google-exposes-lostkeys-malware-linked-to-russian-cyber-espionage/
[3] https://cloud.google.com/blog/topics/threat-intelligence/coldriver-steal-documents-western-targets-ngos
[4] https://cyberpress.org/russian-coldriver-hackers-use-lostkeys-malware/
[5] https://hide.me/en/blog/russian-hacker-group-deploys-new-malware/
[6] https://www.infosecurity-magazine.com/news/russian-group-lostkeys-malware/
[7] https://cybersecuritynews.com/russian-coldriver-hackers-using-lostkeys-malware/
[8] https://cyberinsider.com/russian-state-actors-use-new-lostkeys-malware-to-steal-docs-from-western-orgs/
[9] https://cybersecsentinel.com/lostkeys-malware-campaign-traced-to-cold-river-threat-group/
[10] https://gbhackers.com/russian-coldriver-hackers-deploy-lostkeys-malware/