Security

Research

Google TAG: Kremlin cyber spies move into malware with a custom backdoor

The threat hunters believe COLDRIVER has used SPICA since at least November 2022


Russian cyberspies linked to the Kremlin's Federal Security Service (FSB) are moving beyond their usual credential phishing antics and have developed a custom backdoor that they started delivering via email as far back as November 2022, according to Google's Threat Analysis Group.

TAG tracks this crew as COLDRIVER, while other threat hunters call the government-backed gang Star Blizzard, UNC4057 and Callisto. The gang has been active since at least 2019, and historically targets academia, the military, governmental orgs, NGOs, think tanks, and politicians in US, the UK and other NATO countries. 

Since Russia invaded its neighbor in February 2022, COLDRIVER has also stepped up its snooping activities against Ukraine's military and defense targets as well as those of other Eastern European nations.

It turns out they're moving into malware with a backdoor called SPICA. It's written in Rust and uses JSON over websockets for command and control (C2), we're told. 

Once executed on a victim's device, it has several capabilities including executing shell commands, stealing cookies from Chrome, Firefox, Opera and Edge; uploading and downloading files; and snooping through and stealing documents.

"TAG has observed SPICA being used as early as September 2023, but believe that COLDRIVER's use of the backdoor goes back to at least November 2022," the Chocolate Factory's threat hunting team said in an analysis published today. 

SPICA is the first custom malware that TAG attributes to the Kremlin-backed group. 

In addition to publishing details about the backdoor and how the campaign works, the Chocolate Factory also posted an extensive list of indicators of compromise including hashes, the SPICA sample name, and C2 address.

These expeditions tend to be highly targeted, focusing on "high-profile individuals in NGOs, former intelligence and military officials, defense, and NATO governments," Google TAG's Billy Leonard told The Register.

"TAG has only observed SPICA used in a very small number of campaigns, targeting a small number of organizations and individuals," Leonard said.

To deliver the malware, COLRIVER relies on its older, tried-and-true tactics.

The criminals research their targets on social media, creating fake profiles and messaging their marks to build rapport. 

They also use web-based email accounts that impersonate someone the target knows or a well-known industry figure, and go after high-profile individuals' personal email accounts, which are usually less protected than the same individuals' official government inboxes. 

Just last month the Five Eyes' government agencies and Microsoft issued separate reports about COLDRIVER's increasingly sophisticated evasion techniques and phishing tactics.

"As far back as November 2022, TAG has observed COLDRIVER sending targets benign PDF documents from impersonation accounts," the Chocolate Factory said in today's account of the gang's evolving espionage efforts.

The crew impersonates email addresses to trick victims into believing these documents are op-eds, or some other article for publication. The victim, we're told, can't open the benign PDF, which appears to be encrypted. 

It's not, but this usually prompts a return email from the victim saying they can't open the doc. Then the phony email account responds with a link to a "decryption" utility that is actually the SPICA backdoor. 

While the threat hunters were only able to snag one instance of the malware to analyze, they believe there are multiple versions of SPICA, each using a different decoy PDF. ®

Send us news
5 Comments

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Rock Chrome hard enough and get paid half a million

Google revises Chrome Vulnerability Rewards Program with higher payouts for bug hunters

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Yelp accuses Google of being a local search bully in antitrust lawsuit

Chocolate Factory claims rival is trying to revive cases it's already lost

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals