InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Russian hacker deploying new Lostkeys malware using Clickfix FakeCaptcha
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Russian hacker deploying new Lostkeys malware using Clickfix FakeCaptcha
Technology

Russian hacker deploying new Lostkeys malware using Clickfix FakeCaptcha

May 8, 2025 5 Min Read
Share
LOSTKEYS Malware
SHARE

A Russian-related threat actor known as Coldriver It has been observed to distribute new malware called LostKeys As part of a spy-focused campaign using social engineering lures like Clickfix.

“LostKeys can steal files from hardcoded lists of extensions and directories, and can send system information and running processes to attackers.”

The malware was observed in January, March and April 2025 in attacks on Western governments, the military, and current and former advisors against journalists, think tanks and NGOs, according to the company. Additionally, individuals connected to Ukraine are also chosen.

LostKeys is the second custom malware that stems from the Coldriver after Spica, marking a continuous deviation from the phishing campaigns of the qualifications that threat actors are known to. Hacking groups are also tracked by the names Callisto, Star Blizzard, and UNC4057.

“They are known to steal qualifications, and after accessing the target account, they remove emails and steal contact lists from the compromised account,” said security researcher Wesley Shields. “If you choose, Coldriver may attempt to distribute malware to the target device and access files on the system.”

The latest series of attacks starts with a decoy website that contains a fake Captcha verification prompt. Victims are instructed to paste a Powershell command copied into Clipboard, a widely popular social engineering technique called Clickfix, into Clickfix, open the Windows Run dialog and paste the PowerShell command.

The PowerShell command is designed to download and run the following payload from a remote server (“165.227.148(.)68”). This acts as a three-stage downloader before carrying out any possible efforts to avoid running on virtual machines.

The third stage payload, a base64 encoded blob, is decoded into a PowerShell script responsible for running the lost keys of compromised hosts, allowing threat actors to collect files from hardcoded lists of extensions and directories, run the process and collect files.

See also  AI is giving pets a voice: The future of cat health care begins with one photo

Malware is rated as being deployed selectively, as in the case of SPICA. It demonstrates the highly targeted nature of these attacks.

Google also said it had discovered additional Lostkeys artifacts dating back to December 2023, spoofing a binary related to the Maltego open source research platform. It is unclear whether these samples have something to do with Coldriver or whether the malware has been reused by threat actors since January 2025.

Clickfix adoption continues to grow

This development is because Clickfix continues to be steadily adopted by multiple threat actors, distributing a wide range of malware families, including bank Trojans called Lampion and Atomic Stealer.

Every Palo Alto Networks Unit 42, attack Lampion propagation and use a phishing email with ZIP file attachments as lures. HTML files residing in the ZIP archive will use ClickFix instructions to launch the Multi stage infection process to redirect message recipients to a fake landing page.

“Another interesting aspect of Lampion’s infection chain is that it is divided into several non-continuous stages that are carried out as separate processes,” Unit 42 said. “This distributed execution complicates detection because the attack flow does not form a process tree that is easily identifiable. Instead, it consists of a complex chain of individual events, some of which may appear benign on their own.”

Malicious campaigns target Portuguese-speaking individuals and organizations in a variety of areas, including government, finance and transportation.

Over the last few months, the Clickfix strategy has been combined with another sleazy tactic called EtherHiding, which uses Binance’s Smart Chain (BSC) contract to hide the payload of the next stage, eventually leading to the delivery of a MacOS information steeler called Atomic Stealer.

See also  AI Status in 2025: Important Takeaways from Stanford's Latest AI Index Report

Clicking “I’m Not a Robot” will trigger a Binance Smart Contract using ether hiding techniques to deliver base64-encoded commands to the clipboard. This prompts the user to run in the terminal via a Macos-specific shortcut (⌘+Space, ⌘+V). “This command downloads a script that retrieves and executes a signed MACH-O binaries confirmed as an atomic stealer.”

Further investigations have shown that the campaign likely compromised around 2,800 legitimate websites to serve fake capture prompts. The large-scale watering hole attack has been called MacReaper by researchers.

“This attack will maximize infection by leveraging unforeseen JavaScript, three full-screen IFRAMEs and a blockchain-based command infrastructure,” the researchers added.

Share This Article
Twitter Copy Link
Previous Article 19 Best Cities Skylines 2 mods 19 Best Cities Skylines 2 mods
Next Article mm AI-driven cloud cost optimization: strategies and best practices

Latest News

mm

AI is giving pets a voice: The future of cat health care begins with one photo

Artificial intelligence is revolutionizing the way we care for animals.…

May 15, 2025
5 BCDR Essentials for Effective Ransom Defense

5 BCDR Essentials for Effective Ransom Defense

Ransomware has evolved into a deceptive, highly tuned, dangerous and…

May 15, 2025
mm

Anaconda launches the first unified AI platform to redefine enterprise-grade AI development

Anaconda Inc., a longtime leader in Python-based data science, has…

May 14, 2025
Microsoft fixed 78 flaws and exploited five zero-days. CVSS 10 bug affects Azure DevOps servers

Microsoft fixed 78 flaws and exploited five zero-days. CVSS 10 bug affects Azure DevOps servers

On Tuesday, Microsoft shipped fixes to address a total of…

May 14, 2025
mm

Why language models are “lost” in conversation

A new paper from Microsoft Research and Salesforce found that…

May 13, 2025

You Might Also Like

Malicious npm Packages
Technology

North Korean hackers deploy Beavertail malware via 11 malicious NPM packages

5 Min Read
New XorDDoS Controller, Infrastructure
Technology

Experts discover new Xordos controllers, infrastructure as malware expands to Docker, Linux and IoT

3 Min Read
Meta starts the llamafirewall framework and stops AI jailbreak, injection, and safe code
Technology

Meta starts the llamafirewall framework and stops AI jailbreak, injection, and safe code

3 Min Read
Open Source AI fights back with Meta's Lama 4
Technology

Open Source AI fights back with Meta’s Lama 4

14 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?