LostKeys Larceny: Russia-Linked Hackers Swipe Files in Espionage Escapade
Russia-linked ColdRiver has been using LostKeys malware for espionage since early 2025. Their “ClickFix” attacks trick victims into running malicious scripts to steal data. Known for targeting high-profile NATO countries, ColdRiver’s antics are a mix of hacking and spy thriller—minus the popcorn.

Hot Take:
Looks like ColdDriver has been busy playing “Lost Keys” with Western governments’ data, and it’s not the friendly game we used to play as kids! It seems like the malware is just as good at hiding as our real keys when we’re running late. NATO’s got a new kind of scavenger hunt on their hands, but this one involves malware, espionage, and a fake CAPTCHA that makes you question your humanity. Who knew that entering a CAPTCHA could lead to a cyber soap opera of international intrigue?
Key Points:
– **ColdDriver**: Russia-linked cyberespionage group targeting Western entities.
– **LOSTKEYS**: New malware used for stealing data and system information.
– **ClickFix Method**: Involves fake CAPTCHAs and PowerShell scripts.
– **High-Profile Targets**: Government officials, journalists, and NGOs.
– **Google’s Discovery**: Identified the malware and linked it to ColdDriver.