Trending

#ColdRiver

Latest posts tagged with #ColdRiver on Bluesky

Latest Top
Trending

Posts tagged #ColdRiver

A rugged winter landscape unfolds along a narrow river running beside a towering rock cliff. The cliff face is composed of layered stone in warm brown and gray tones, its rough textures forming ledges and overhangs that extend outward above the water. From these rocky shelves hang long clusters of thick icicles, some thin and needle-like while others form broad frozen curtains where dripping water has solidified into pale blue ice. The icicles vary in length and density, creating a dramatic fringe along the edge of the cliff.

Below them, a small waterfall has partially frozen, forming a column of translucent ice where water once cascaded freely. At its base, the river continues to flow, its dark green surface twisting and rippling as it moves between icy banks and scattered rocks. Patches of ice cling to the shoreline and extend slightly over the water, their edges jagged and frosted.

Snow dusts the surrounding terrain and settles on the rocks along the riverbank. In the background, the canyon walls fade into a pale winter haze, and sparse leafless trees cling to the upper ridge of the cliff. The atmosphere is cold and quiet, capturing a moment where motion and stillness coexist: frozen waterfalls suspended above a restless current that continues its path through the frozen gorge.

Keywords
frozen waterfall, icy cliff face, winter river, hanging icicles, rugged canyon, flowing cold water, snow-covered rocks, frozen ledge, dramatic winter landscape, icy gorge

Clearly identified as AI-generated; use is permitted for non-commercial creative projects. MidJourney, FLUX.1-schnell model via Perchance, Artspace.ai, REVE, Echoform™.

A rugged winter landscape unfolds along a narrow river running beside a towering rock cliff. The cliff face is composed of layered stone in warm brown and gray tones, its rough textures forming ledges and overhangs that extend outward above the water. From these rocky shelves hang long clusters of thick icicles, some thin and needle-like while others form broad frozen curtains where dripping water has solidified into pale blue ice. The icicles vary in length and density, creating a dramatic fringe along the edge of the cliff. Below them, a small waterfall has partially frozen, forming a column of translucent ice where water once cascaded freely. At its base, the river continues to flow, its dark green surface twisting and rippling as it moves between icy banks and scattered rocks. Patches of ice cling to the shoreline and extend slightly over the water, their edges jagged and frosted. Snow dusts the surrounding terrain and settles on the rocks along the riverbank. In the background, the canyon walls fade into a pale winter haze, and sparse leafless trees cling to the upper ridge of the cliff. The atmosphere is cold and quiet, capturing a moment where motion and stillness coexist: frozen waterfalls suspended above a restless current that continues its path through the frozen gorge. Keywords frozen waterfall, icy cliff face, winter river, hanging icicles, rugged canyon, flowing cold water, snow-covered rocks, frozen ledge, dramatic winter landscape, icy gorge Clearly identified as AI-generated; use is permitted for non-commercial creative projects. MidJourney, FLUX.1-schnell model via Perchance, Artspace.ai, REVE, Echoform™.

#Mar26Challenge Mar 11: Snow Becoming Water
Frozen Run
Winter hangs from the cliff while the river refuses to stop moving.
#FrozenWaterfall #WinterCliff #IcyLandscape #ColdRiver #WildWinter #GenAI #SynthArt #AIart #aiartist #aiartcommunity #GenerativeArt #AIchallenge #BuilderofNightmares

10 0 0 0
Post image

🇷🇺 French NGO Reporters Without Borders targeted by #Calisto in recent campaign

Sekoia #TDR analysed a recent #Calisto (aka #ColdRiver #Star Blizzard) spear-phishing campaign aimed at Reporters sans frontières and other #Ukraine-supporting organisations.

blog.sekoia.io/ngo-reporter...

5 4 1 0
Russian APT COLDRIVER Rapidly Deploys New NOROBOT Malware After Public Disclosure Russian APT group COLDRIVER (UNC4057) quickly deployed new malware families, NOROBOT and MAYBEROBOT, after its LOSTKEYS tool was publicly disclosed, targeting high-value individuals.

🇷🇺 Russian APT COLDRIVER rapidly retooled after public disclosure, deploying new NOROBOT & MAYBEROBOT malware. The group is targeting NGOs & policy advisors with a new PowerShell backdoor. ⚡️ #COLDRIVER #APT #ThreatIntel #Russia

0 0 0 0
Post image

#COLDRIVER went from #LOSTKEYS to a full “ROBOT” chain and #ClickFix tricks—then started poking linked-device flows. We put 75% on a truly new family or access vector within 12 months.

Read the forecast 👇
blog.alphahunt.io/coldrivers-n...

#AlphaHunt #ThreatIntel

0 0 0 0

📰 PhantomCaptcha ClickFix: Serangan Spearphishing Targetkan Lembaga Bantuan Perang Ukraina

👉 Baca artikel lengkap di sini: ahmandonk.com/2025/10/23/phantomcaptch...

#clickfix #coldriver #phantomcaptcha #red #cross #sentinelone #spearphishing #ukraine #un

0 0 0 0
Post image

PhantomCaptcha colpisce organizzazioni ucraine con spearphishing mirato e RAT WebSocket multistadio, combinando ingegneria sociale e malware PowerShell evasivo.

#apt #coldriver #PhantomCaptcha #Powershell #RAT #Russia #SentinelOne #ucraina #WebSocket
www.matricedigitale.it/2025/10/22/p...

0 0 0 0
Post image

Russian state-backed hackers Star Blizzard (aka #ColdRiver / Callisto / UNC4057) have ramped up ops, unleashing new malware — NOROBOT, YESROBOT, MAYBEROBOT — via ClickFix CAPTCHA-style lures. Victims think they’re proving they’re human — but end up running code. #CyberSecurity #APT

2 0 1 0
Post image

Google's Threat Intelligence Group uncovers three new Russian malware families NOROBOT, YESROBOT, and MAYBEROBOT developed by COLDRIVER hackers. #CyberSecurity #COLDRIVER #MalwareAlert Link: thedailytechfeed.com/google-uncov...

0 0 0 0

📰 Peretas Rusia Gunakan Malware Baru di CAPTCHA "I Am Not a Robot"

👉 Baca artikel lengkap di sini: ahmandonk.com/2025/10/22/russian-hacke...

#clickfix #coldriver #espionage #google #malware #mayberobot #norobot #russia #star #blizzard

0 0 0 0
Post image

Google attribuisce a COLDRIVER un nuovo malware russo con famiglie NOROBOT e MAYBEROBOT, evoluto per eludere rilevamenti e condurre operazioni di spionaggio.

#apt #backdoor #coldriver #GoogleThreatIntelligenceGroup #MAYBEROBOT #NOROBOT #Russia #YESROBOT
www.matricedigitale.it/2025/10/20/n...

0 0 0 0
COLDRIVER's New Malware

~Mandiant~
Russian state-actor COLDRIVER deploys new NOROBOT & MAYBEROBOT malware after their LOSTKEYS tool was publicly disclosed.
-
IOCs: 85. 239. 52. 32, system-healthadv. com, southprovesolutions. com
-
#COLDRIVER #Malware #ThreatIntel

0 0 0 0
Post image

Coldriver distribuisce Baitswitch e Simplefix via campagne Clickfix: analisi tecnica, IOC e contromisure per ONG, giornalisti e attivisti.

#apt #Baitswitch #ClickFix #coldriver #Russia #Simplefix
www.matricedigitale.it/2025/09/27/c...

0 0 0 0
Post image

COLDRIVER's latest campaign employs ClickFix tactics to deploy new malware strains, BAITSWITCH and SIMPLEFIX, targeting Russian entities. Stay vigilant. #CyberSecurity #COLDRIVER #Malware Link: thedailytechfeed.com/coldrivers-n...

0 0 0 0

Russia itself faces threats: BO Team spreads BrockenDoor + ZeronetKit backdoor, while Bearlyfy (linked to PhantomCore) has hit 30+ firms with LockBit/Babuk ransomware since Jan 2025, demanding up to €80k.
#COLDRIVER #Russia #APT #Cybersecurity #ClickFix #Malware

0 0 0 0
Post image

COLDRIVER targets policy and critical infrastructure using BAITSWITCH-SIMPLEFIX chain Threat Group – COLDRIVER Threat Type – Espionage malware and social engineering Exploited Vulnerabilities ...

#COLDRIVER #Malware #BAITSWITCH #SIMPLEFIX #ClickFix

Origin | Interest | Match

0 0 0 0
COLDRIVER Deploys BAITSWITCH & SIMPLEFIX Malware

~Zscaler~
Russia-linked APT COLDRIVER targets civil society with new BAITSWITCH downloader and SIMPLEFIX backdoor via ClickFix campaigns.
-
IOCs: captchanom. top, southprovesolutions. com, preentootmist. org
-
#BAITSWITCH #COLDRIVER #ThreatIntel

0 0 0 0

Another fake CAPTCHA? Must be Tuesday.

🪆Russia's #COLDRIVER is back with #LOSTKEYS —because who needs originality when you have
PowerShell scripts?

Dive into our latest snark-filled breakdown before your inbox becomes their playground.

0 0 1 0
Preview
COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs | Google Cloud Blog Russian government-backed group COLDRIVER is using LOSTKEYS malware to steal files and system information from NGOs and western targets.

COLDRIVER’s phishing isn’t new, but LOSTKEYS is.

Wesley Shields (Google TAG) just dropped new research on the FSB-linked threat group’s latest toolset.

Read the full blog:
cloud.google.com/blog/topics/...

Watch his CWC vid:
www.youtube.com/watch?v=gg5y...

#Cybersecurity #COLDRIVER

4 3 0 1
Preview
Lostkeys Malware: Russian Group Coldriver Targets Western Officials in Espionage Campaign  A new wave of cyber espionage has emerged, with Russian hackers deploying a sophisticated malware strain known as “Lostkeys” to infiltrate the systems of Western officials, journalists, and NGOs. According to researchers from Google’s Threat Intelligence Group, the malware is linked to Coldriver, also known as UNC4057, Star Blizzard, or Callisto—a threat actor believed to be part of Russia’s Federal Security Service (FSB), the successor to the KGB.  Coldriver has traditionally been involved in phishing operations to steal credentials, but the emergence of Lostkeys demonstrates a significant leap in their cyber capabilities. Lostkeys appears to mark a shift in strategy for the group, moving beyond phishing and into deeper system infiltration. The malware is deployed in a targeted manner, reserved for high-value individuals such as political advisors, think tank members, journalists, and people with known connections to Ukraine. Activity related to Lostkeys was observed by Google in the early months of 2024—specifically January, March, and April—with evidence suggesting its use might have started as far back as December 2023. The attack begins with a deceptive Captcha page, tricking victims into copying a malicious PowerShell script into the Windows Run dialog. This method, known as “ClickFix,” bypasses typical security filters and exploits user behavior rather than software vulnerabilities.  Once executed, the script connects to a command-and-control server, downloading a series of payloads uniquely tailored to each victim. In an effort to avoid detection, the malware includes anti-sandbox measures. During the second stage of infection, the script checks the screen resolution of the host machine and halts if it matches known virtual machine environments used by analysts and cybersecurity researchers. If the device passes this check, the malware proceeds to the final stage—a Visual Basic Script that steals data, including specific file types, system details, and active processes. These are exfiltrated back to the attackers using an encoded system that applies a unique two-key substitution cipher for each infected machine.  Lostkeys appears to be a more refined successor to a previous malware strain known as Spica, which Coldriver also deployed in 2024. While both strains focus on data exfiltration, Lostkeys features a more intricate delivery system and improved obfuscation techniques. Some earlier samples of Lostkeys mimicked legitimate software like Maltego and used executable files instead of PowerShell, though Google has not confirmed if these instances were part of the same campaign or the work of a different threat actor reusing Coldriver’s tactics.  This development highlights an alarming evolution in state-backed cyber operations, where advanced social engineering and stealth techniques are being increasingly used to infiltrate high-profile targets. As geopolitical tensions persist, the risks posed by such targeted cyber espionage campaigns are expected to grow.

Lostkeys Malware: Russian Group Coldriver Targets Western Officials in Espionage Campaign #COLDRIVER #Coldriverhackergroup #CyberAttacks

0 0 0 0
Post image

Google scopre LostKeys: malware russo per lo spionaggio
#ClickFix #COLDRIVER #CyberEspionage #Cybercrime #FSB #Geopolitica #Google #LostKeys #Malware #Notizie #Russia #Sicurezza #Spionaggio #StateSponsoredHacking #TechNews #Tecnologia #ThreatIntelligence #VBS
www.ceotech.it/google-scopr...

0 0 0 0
Preview
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware Threat Analysis Group sheds light on Russian threat COLDRIVER’s use of malware.

COLDRIVER just leveled up.

Google TAG says the Russian APT is now dropping Rust-based malware (SPICA) via fake PDFs + malicious LNK files in ZIPs. From phishing creds to custom malware—this is a serious pivot.

Article: blog.google/threat-analy...

#CyberThreatIntel #APT #COLDRIVER #Malware

1 0 0 0
Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google, #COLDRIVER Bilgisayar Korsanları Tarafından Kullanılan #Kötü Amaçlı Yazılımları Buluyor

#cyberattack, dosyaları yeni LOSTKEYS aracını kullanarak gönderir.

Daha fazla oku: blockzhub.io/news/681c4d2d169548a263b...

0 0 0 0
Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google trova #Malware utilizzato dagli hacker #COLDRIVER

Il #cyberattack invia file utilizzando il nuovo strumento LOSTKEYS.

Leggi di più: blockzhub.io/news/681c4d2d169548a263b...

0 0 0 0
Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google findet #Malware, die von #COLDRIVER -Hackern verwendet wird

Der #Cyberangriff versendet Dateien mit dem neuen Tool LOSTKEYS.

Weiterlesen: blockzhub.io/news/681c4d2d169548a263b...

0 0 0 0
Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google обнаружил #Malware, используемое хакерами #COLDRIVER

#cyberattack отправляет файлы с помощью нового инструмента LOSTKEYS.

Читать далее: blockzhub.io/news/681c4d2d169548a263b...

0 0 0 0
Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google découvre un #Malware utilisé par les pirates #COLDRIVER

La #cyberattaque envoie des fichiers à l'aide du nouvel outil LOSTKEYS.

Lire la suite: blockzhub.io/news/681c4d2d169548a263b...

0 0 0 0
Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google encuentra #Malware utilizado por los piratas informáticos #COLDRIVER

El #ciberataque envía archivos mediante la nueva herramienta LOSTKEYS.

Leer más: blockzhub.io/news/681c4d2d169548a263b...

0 0 0 0
Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google에서 #COLDRIVER 해커가 사용하는 #Malware 발견

#cyberattack 은 새로운 도구 LOSTKEYS를 사용하여 파일을 보냅니다.

더 읽기: blockzhub.io/news/681c4d2d169548a263b...

0 0 0 0
Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

谷歌发现 #COLDRIVER 黑客使用的 #Malware

#cyberattack 使用新工具 LOSTKEYS 发送文件。

阅读更多: blockzhub.io/news/681c4d2d169548a263b...

0 0 0 0
Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Identifies New Malware Linked to Russian Hacker Group COLDRIVER

Google Finds #Malware Used By #COLDRIVER Hackers

The #cyberattack sends files using new tool LOSTKEYS.

Read more: blockzhub.io/news/681c4d2d169548a263b...

0 0 0 0