Article Details

Original Article Text

Click to Toggle View

Google: Russian FSB hackers deploy new Spica backdoor malware. Google says the ColdRiver Russian-backed hacking group is pushing previously unknown backdoor malware using payloads masquerading as a PDF decryption tool. The attackers send PDF documents that seem to be encrypted via phishing emails impersonating individuals affiliated with their targets (a tactic first observed in November 2022). When the recipients reply that they can't read the 'encrypted' documents, they're sent a link to download what looks like a PDF decryptor executable (named Proton-decrypter.exe) to view the contents of the lure documents. "COLDRIVER presents these documents as a new op-ed or other type of article that the impersonation account is looking to publish, asking for feedback from the target. When the user opens the benign PDF, the text appears encrypted," Google TAG said. However, even though this fake decryption software will display a decoy PDF document, it will backdoor the victims' devices using a malware strain dubbed Spica by security researchers with Google's Threat Analysis Group (TAG), who spotted the attacks. The researchers believe that there likely are multiple Spica samples matching the phishing lures, each with a different decoy document, even though they were only able to capture a single sample while investigating this campaign. The Spica Rust-based malware uses JSON over websockets to communicate with its command-and-control (C2) server, and it helps to run arbitrary shell commands, steal Chrome, Firefox, Opera, and Edge cookies, upload and download files, and exfiltrate documents. Once deployed, Spica will also establish persistence using an obfuscated PowerShell command that will create a 'CalendarChecker' scheduled task on the compromised devices. "TAG has observed SPICA being used as early as September 2023, but believe that COLDRIVER's use of the backdoor goes back to at least November 2022," Google TAG said. "While TAG has observed four different variants of the initial "encrypted" PDF lure, we have only been able to successfully retrieve a single instance of SPICA." Government-backed attack alerts Google has added all domains, websites, and files used in these attacks to its Safe Browsing phishing protection service and notified all targeted Gmail and Workspace users that they were the target of a government-backed attack. Also tracked as Callisto Group, Seaborgium, and Star Blizzard, ColdRiver has been active since late 2015, and it is known for its operators' open-source intelligence (OSINT) and social engineering skills used to research and lure targets in spear-phishing attacks. In December, the United Kingdom and Five Eyes allies linked ColdRiver to Russia's 'Centre 18' Federal Security Service (FSB) division, the country's internal security and counterintelligence service. Previously, Microsoft thwarted ColdRiver attacks targeting several European NATO nations by disabling Microsoft accounts the attackers used for surveillance and harvesting emails. Since December 2023, the U.S. State Department has been offering rewards of up to $ 10 million reward for information that could lead to the location or identification of ColdRiver threat actors.

Daily Brief Summary

NATION STATE ACTIVITY // Google Unveils New FSB-Linked Spica Backdoor Malware Attacks

Google's Threat Analysis Group discovered a new backdoor malware, named Spica, used by Russian-backed hackers.

The ColdRiver group, linked to Russia's FSB, used phishing emails with encrypted PDF lures to distribute the Spica backdoor.

The PDF documents were seemingly encrypted, with recipients directed to download a fake PDF decryptor that installed Spica.

The Spica malware allows attackers to run shell commands, steal browser cookies, transfer files, and exfiltrate documents from infected devices.

The malware establishes persistence on targeted systems by creating a scheduled task named 'CalendarChecker.'

Google has alerted all compromised Gmail and Workspace users of the government-backed attack and bolstered Safe Browsing protections with relevant domains.

ColdRiver, also known as Callisto Group, Seaborgium, and Star Blizzard, has been active since 2015 and is known for sophisticated OSINT and social engineering tactics.

The U.S. State Department is offering rewards up to $10 million for information leading to ColdRiver threat actors, emphasizing the severity of their activities.