Google has uncovered evidence linking a prolific cyber espionage operation to Russia. The company's Threat Analysis Group (TAG) has been monitoring the hacking collective known as Cold River, Callisto Group, and Star Blizzard due to their long history of sophisticated intrusions against Western nations.
According to information provided by TAG researchers, a Russian spy group has launched a new malicious software campaign. This organization, which is well known for its long-running cyber espionage activities targeting NATO members like the United States and United Kingdom, is now employing improved tactics to infect victims' devices with harmful programs designed to steal data.
The group in question, referred to as Cold River but also operating under the aliases Callisto Group and Star Blizzard, primarily focuses its hacking efforts on individuals and organizations involved in international affairs and defense. Researchers believe the strong ties between the group's operations and the Russian state are evident. Recently, Russian citizens in America were directly implicated in the group's activities through their involvement.
Google's threat analysts indicate that in recent months, Cold River has significantly ramped up its activities, utilizing new, more destructive techniques against targets. These targets typically include entities in Ukraine, NATO allies, academic institutions, and government bodies.
According to the information provided, when victims open PDF documents, the text appears encrypted. If target reports being unable to read the file, the attackers send a link to a "decryption tool." This tool, identified by Google researchers as a custom backdoor called SPICA, grants the hackers persistent access to infiltrate devices, run commands, and extract login files and documents from the user's machine.
While TAG believes SPICA is only being deployed in limited targeted attacks for now, its researchers warn that the development and use of malware by this group is likely ongoing. Google has taken steps to block Cold River's malicious software campaigns by adding related sites and files to its Safe Browsing service to protect users from these sophisticated hacking techniques.
This latest discovery further underscores Cold River's prolonged pattern of malicious behavior, which has in the past included breaches that exposed sensitive emails and documents to undermine political groups in the UK. Google will continue monitoring for signs of this advanced persistent threat resuming its digital espionage operations worldwide.