InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack
Technology

New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack

September 28, 2025 6 Min Read
Share
New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack
SHARE

The Russian Advanced Persistent Threat (APT) group known as Coldriver is attributed to a Clickfix-style fresh attack designed to provide two new “lightweight” malware families tracked as Baitswitch and Simplefix.

Zscaler Threatlabz, which detected a new multi-stage click fix campaign earlier this month, described Baitswitch as a downloader that ultimately drops SimpleFix, a PowerShell backdoor.

Tracked also as Callisto, Star Blizzard and UNC4057, Coldriver is a moniker assigned to Russia-related threat actors known to target a wide range of sectors since 2019.

The use of enemy Clickfix tactics will use fake sites previously documented by Google Threat Intelligence Group (GTIG) in May 2025 and use fake sites that provide fake Captcha verification prompts to trick victims and run PowerShell commands designed to provide LostKeys Visual Basic Script.

“The ongoing use of Clickfix suggests that it is an effective infection vector, even if it is not innovative or technologically advanced,” Zscaler security researchers Sudeep Singh and Yin Hong Chang said in a report released this week.

The latest attack chain follows the same trick and forces unsuspecting users to run malicious DLLs in the Windows Run dialog, pose as if they complete a Captcha check. Baitswitch in the DLL reaches into the attacker control domain (“Captchanom(.)Top”) to get a SimpleFix backdoor, and a decoy document hosted on Google Drive is presented to the victim.

It also makes several HTTP requests to the same server to send system information, receives commands that establish persistence, stores the encrypted payload in the Windows registry, downloads PowerShell Stager, clears the latest commands executed in the Run dialog, and effectively erases traces of ClickFix attacks that caused the infection.

See also  Samsung fixes critical zero-day CVE-2025-21043 utilized in Android attacks

The downloaded PowerShell Stager will then contact the external server (“SouthProveSolutions(.)com”) to download SimpleFix. This establishes communication with the Command and Control (C2) server to run binaries hosted by PowerShell scripts, commands, and remote URLs.

One of the PowerShell scripts executed in SimpleFix Exftrate is run through information about a hard-coded list of file types in a list of pre-configured directories. The directory listing and file extension list overlap with the LostKeys stock.

“The Coldriver APT Group is known for targeting NGO members, human red defenders, think tanks in the western region, and individuals who have been exiled and resident in Russia,” Zscaler said. “The focus of this campaign is closely aligned with the victims targeting members of civil society associated with Russia.”

The BO team and the target Russia

The development is developing as Kaspersky said in early September that a new phishing campaign targeting Russian companies, conducted by the BO Team Group (aka Black Owl, Hoody Hyena, Lifting Zmiy) used a password-protected RAR archive to provide a new version of Brockendoor Rewrith and an updated version of Zeronetkit.

Golang Backdoor’s Zeronetkit supports remote access to compromised hosts, features to upload/download files, run commands using CMD.exe and create TCP/IPv4 tunnels. The new version you select also includes support for downloading and running shellcode, updating the communication interval with C2 and modifying the C2 server list.

“Because Zeronetkit cannot be independently sustained on infected systems, attackers will use Brockendoor to copy downloaded backdoors to startups,” said a Russian cybersecurity vendor.

It also follows the emergence of a new group called Bearlyfy, which used ransomware stocks such as Lockbit 3.0 and Babuk in attacks targeting Russia in Russia-targeted attacks. As of August 2025, the group is estimated to have claimed at least 30 victims.

One incident targeting consulting firms has been observed to weaponize vulnerable versions of Bitrix for initial access, then escalating privileges using Zerorologon’s flaws. Another case observed in July is said to have been promoted through an unknown partner.

See also  Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine

“In the latest recorded attacks, the attackers demanded 80,000 euros in cryptocurrency, but in the first attack the ransom was thousands of dollars,” F6 researchers said. “On average, all fifth victims buy decryptors from the attacker because of their relative low ransom.”

Bearlyfy has been rated active since January 2025, and a deeper analysis of its tool has overlapping with a potentially ukrain threat group called Phantomcore, where infrastructure is likely to overlap.

“Phantomcore implements the complex multi-stage attacks typical of APT campaigns,” the company said. “On the other hand, Bearlyfy uses a different model. It uses attacks with a targeted focus on achieving minimal preparation and immediate effect. Initial access is achieved through the use of external services and vulnerable applications. The main toolkits are intended to be encryption, destruction, or data correction.”

Share This Article
Twitter Copy Link
Previous Article Parkour Champions Code September 2025 Parkour Champions Code September 2025
Next Article Missouri Governor is a Trump-backed GOP gerrymander signed the law on the map Missouri Governor is a Trump-backed GOP gerrymander signed the law on the map

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine
Technology

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine

4 Min Read
ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet
Technology

ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet

5 Min Read
Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Technology

Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route

4 Min Read
Six browser-based attack security teams need to prepare now
Technology

Six browser-based attack security teams need to prepare now

13 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?