Skip to content
October 8, 2025
Newsletter
Random News
Securitydive

Securitydive

Data Security

  • News
    • Industry News
    • Product News
    • Tech News
  • Articles
    • Industry Trend
    • Tech Trend
    • Product Trend
  • Deep Analysis
  • Interviews
    • Corporate Interviews
    • Expert Interviews
  • Hacking Fox
    • International Hacking News
    • National Hacking News
  • About us
  • Contact us
  • Home
  • 2025
  • May
  • 7
  • Google identifies Malware linked to Russia-based Hacking group
  • CYBERSECUIRTY NEWS

Google identifies Malware linked to Russia-based Hacking group

admin5 months ago5 months ago02 mins
Google it has identified new malware called “LOSTKEYS” tied to the Russian-based hacking group Cold River, which is capable of stealing files and sending system information to attackers.
The malware “marks a new development in the toolset” of Cold River, Wesley Shields, a researcher with Google Threat Intelligence Group, said in a blog, opens new tab.
Cold River, a name used to track hacking campaigns previously linked, opens new tab to Russia’s Federal Security Service, is primarily known for stealing login credentials for high-profile targets, including those within NATO governments, non-governmental organizations and former intelligence and diplomatic officers, Shields said in the blog. The central goal was intelligence collection in support of Russian strategic interests.
Recent targets, observed in January, March and April 2025, include current and former advisers to Western governments and militaries, as well as journalists, think tanks and NGOs, and unnamed individuals connected to Ukraine, according to the blog.
The Russian embassy in Washington did not immediately respond to a request for comment.
(Courtesy: Reuters)
Tagged: Cold riber cyber security Cyber threat Login credentials Malware NATO Russian hacking group

Post navigation

Previous: Multiple Ransomware Groups may have exploited a Patched Windows Flaw as Zero-Day
Next: BSE Warns of Cyber Threats, Tightens Security

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

C2A Security Acquires Vigilant Ops, Creating a Global Market-Leading AI-Powered Product Security Powerhouse, adding Tens of MedTech, Telecom, and Defense Customers

admin5 hours ago 0

RCE flaw in Redis let attackers escape Lua sandbox

admin6 hours ago 0

Recent Posts

  • C2A Security Acquires Vigilant Ops, Creating a Global Market-Leading AI-Powered Product Security Powerhouse, adding Tens of MedTech, Telecom, and Defense Customers
  • RCE flaw in Redis let attackers escape Lua sandbox
  • Red Hat confirms security incident after hackers breach GitLab instance
  • Harrods reveals 430,000 exposed in third-party breach, refuses to engage with attackers
  • Delivering Cybersecurity at the Speed of War with CSRMC by DoW

Recent Comments

No comments to show.

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023

Categories

  • AI
  • Articles
  • Cloud Security
  • Corporate Interviews
  • Cyber Security
  • CYBERSECUIRTY NEWS
  • Data security
  • Deep Analysis
  • Expert Interviews
  • Hacking Fox
  • Industry News
  • Industry Trend
  • Information security
  • International Hacking News
  • Interviews
  • Interviews
  • Leadership
  • National Hacking News
  • News
  • Product News
  • Product Trend
  • Ransomware
  • Report
  • Tech News
  • Tech Trend
  • Uncategorized

Quick links

  • About us
  • Contact us

Newsletter

Securitydive 2025. Powered By BlazeThemes.
  • News
  • Articles
  • Deep Analysis
  • Interviews
  • Hacking Fox

WhatsApp us