Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

COLDRIVER (APT) – Threat Actor

February 13, 2025
Reading Time: 4 mins read
in APT, Threat Actors
COLDRIVER (APT) – Threat Actor

COLDRIVER

Other Names

Cold River
Nahr el bared
Nahr Elbard
Cobalt Edgewater
TA446
Seaborgium
TAG-53
BlueCharlie
Blue Callisto
Calisto
Star Blizzard
UNC4057

Location

Russia

Date of Initial Activity

2019

Suspected Attribution 

APT

Associated Tools

DNSpionage

SPICA

Motivation

Espionage
Data Theft

Software

Database
Servers

Overview

The COLDRIVER threat actor, also known by other aliases such as UNC4057, Star Blizzard, and Callisto, is a highly sophisticated and persistent cyber espionage group believed to be aligned with Russian state interests. Over the years, COLDRIVER has been primarily known for conducting credential phishing attacks against high-profile individuals across government agencies, military organizations, and academic institutions, particularly those associated with NATO countries, Ukraine, and other Western entities. The group’s activities have spanned a wide range of targets, including former intelligence officers, military officials, and NGOs, making them one of the most dangerous threat actors targeting sensitive geopolitical domains. COLDRIVER’s operations are characterized by advanced social engineering tactics, where they carefully craft impersonation schemes to gain the trust of their targets. By masquerading as trusted professionals or colleagues within the target’s field, COLDRIVER is able to infiltrate networks and steal highly sensitive credentials. These credential theft operations, however, represent only one facet of their broader espionage agenda. Recently, the group has expanded its arsenal of attack methods, incorporating malware delivery alongside their phishing campaigns. This marks a significant evolution in their capabilities, as they now deploy custom malware to gain deeper and more persistent access to compromised systems.

Common targets

  • Public Administration
  • Information
  • Professional, Scientific, and Technical Services
  • Individuals 
  • United States
  • Lebanon
  • Canada
  • India
  • United Arab Emirates

Attack Vectors

Phishing

Software Vulnerabilities

How they operate

At the core of COLDRIVER’s operations is their phishing infrastructure, which uses impersonation techniques to trick individuals into clicking malicious links or downloading compromised documents. In many of their campaigns, the group creates fake profiles of individuals who are supposedly experts or colleagues within the same industry or organization as their targets. This allows them to establish trust with the victims before sending malicious emails, often disguised as harmless documents or links. By utilizing social engineering, COLDRIVER effectively deceives victims into interacting with these malicious emails, opening the door for credential theft and other forms of exploitation. One of the key developments in COLDRIVER’s toolkit is their adoption of malware delivery as part of their phishing campaigns. The group has been observed using PDF documents as lures, embedding them with malware to establish a foothold on the victim’s machine. These documents are often presented as innocuous, such as drafts of articles or op-eds, making it more likely that the target will open them. Once the victim opens the document, it appears to be benign, but a hidden malicious payload is delivered through a decryption utility. This utility, when downloaded, serves not as a legitimate decryption tool but as a backdoor to the victim’s system, granting COLDRIVER access to execute commands remotely. The backdoor used by COLDRIVER, known as SPICA, is a Rust-based piece of malware designed to evade detection and establish persistence. SPICA operates through a command-and-control (C2) mechanism over websockets, which is a technique that helps it remain undetected by traditional network monitoring tools. Once installed, SPICA gives attackers full control over the compromised machine, allowing them to execute arbitrary shell commands, steal cookies from popular browsers (like Chrome, Firefox, Opera, and Edge), and exfiltrate sensitive documents. One of its notable capabilities is the ability to enumerate files and upload them back to the attacker’s server, providing a means to gather sensitive information over time. COLDRIVER also uses obfuscated PowerShell commands to establish persistence on the compromised machine. By creating scheduled tasks such as “CalendarChecker,” they ensure that their malware survives reboots and continues to operate even after system restarts. These techniques make it difficult for defenders to completely remove the malware, as the scheduled tasks reinitiate the attack process. The use of decoy documents further complicates detection efforts, as it masks the malware’s true intent, presenting the victim with a seemingly harmless document that distracts from the malicious activities occurring in the background. In addition to its operational complexity, COLDRIVER’s campaigns show an evolving pattern of activity. The group has adapted to counter detection mechanisms, altering its tools and techniques in response to security solutions. Their use of cloud storage sites to host malicious payloads, alongside their ability to dynamically change command-and-control infrastructure, makes it harder for defenders to track and block their activities effectively. Moreover, the malware variants used by COLDRIVER are tailored to the specific target, with different embedded documents for each campaign, further complicating threat detection and analysis. COLDRIVER’s technical sophistication underscores the growing risk posed by state-sponsored threat actors. Their shift from credential phishing to full-fledged malware operations reflects a broader trend of increasingly aggressive cyber espionage tactics. As they continue to refine their capabilities, COLDRIVER remains a formidable threat to global security, particularly for governments, defense contractors, and international organizations. To mitigate the risk of such attacks, it is crucial for organizations to implement advanced threat detection mechanisms, including robust phishing defense measures and continuous monitoring of suspicious network activities. Only through a proactive, multi-layered defense strategy can the impact of groups like COLDRIVER be minimized.  
References:
  • Threat Group Cards: A Threat Actor Encyclopedia
  • Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware
Tags: Blue CallistoBlueCharlieCalistoCallistoCanadaCobaltCold RiverCOLDRIVEREdgewaterIndiaLebanonNahr el baredNahr ElbardNATOPhishingRussiaSEABORGIUMSPICAStar BlizzardTA446TAG-53Threat ActorsUkraineUNC4057United Arab EmiratesUnited StatesVulnerabilities
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Spyware in App Stores Steals Your Photos

Stealth Malware Targets Fortinet Firewalls

Prometei Botnet Attacks Servers for Crypto

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

Subscribe to our newsletter

    Latest Incidents

    Aflac Hacked in Spree on Insurance Firms

    CoinMarketCap Doodle Hack Steals Crypto

    UK’s Oxford Council Legacy Systems Breached

    Massive Leak Exposes 16 Billion Credentials

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial