Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

COLDWASTREL (Cybercriminals) – Threat Actor

February 13, 2025
Reading Time: 4 mins read
in Threat Actors
COLDWASTREL (Cybercriminals) – Threat Actor

COLDWASTREL

Location

Russia

Date of Initial Activity

2022

Suspected Attribution 

Cybercriminals

Motivation

Cyberwarfare

Software

Phishing

Overview

COLDWASTREL, also known by the moniker White Dev 185, is a highly sophisticated and persistent cyber espionage group that has been active for several years. This threat actor primarily focuses on targeting non-governmental organizations (NGOs), government entities, and organizations involved in politically sensitive matters, often leveraging social engineering and credential-stealing techniques. Their operations are characterized by a careful selection of victims and a focus on long-term, covert campaigns. While their activities are often difficult to trace, the group’s methods and tactics have been carefully analyzed by cybersecurity experts, revealing a high degree of technical proficiency and operational planning. COLDWASTREL’s campaigns typically involve spear-phishing attacks, where victims are lured into opening malicious attachments, such as PDFs, that contain malware. These attacks are often disguised as legitimate communications, making it challenging for victims to recognize the threat. Once malware is executed, COLDWASTREL gains unauthorized access to the victim’s network, enabling the theft of sensitive data and the escalation of their control over the system. This process of carefully planned infiltration and data exfiltration is indicative of the group’s broader espionage goals, with a particular interest in sensitive or classified information related to geopolitical developments.

Common targets

Individuals

Information

Public Administration

Ukraine

Attack Vectors

Phishing

How they operate

One of the most prominent techniques used by COLDWASTREL is spear-phishing, often conducted through emails that contain malicious attachments such as PDFs. These emails are crafted to appear legitimate, often mimicking communications from trusted sources. When the victim opens the attachment, malware is deployed, typically granting the attacker access to the victim’s network. This initial access allows COLDWASTREL to establish a foothold within the victim’s infrastructure, often going undetected for long periods. The malware deployed in these attacks is sophisticated, capable of evading detection by common security tools and allowing the attacker to remain hidden within the network. Once inside the victim’s system, COLDWASTREL deploys a variety of tactics to escalate privileges and maintain persistence. The group frequently uses a combination of custom malware and legitimate-looking tools to perform these actions. These tools enable the attackers to move laterally within the network, escalating their privileges and compromising additional systems. Their focus on stealth and persistence is reflected in their use of domain names that mimic legitimate services, such as ProtonMail and cloud storage platforms. This deceptive infrastructure makes it difficult for victims to identify the threat, as the malicious domains are designed to appear authentic and blend seamlessly with normal network traffic. The group also makes extensive use of diverse infrastructure to avoid detection. COLDWASTREL operates a wide range of domains, many of which use themes related to legitimate services like ProtonDrive, Facebook, and various email platforms. These domains serve as command-and-control (C2) channels, enabling the attackers to maintain communication with the compromised systems and exfiltrate data without raising alarms. The domains are hosted on servers located in multiple countries, including Romania, Finland, Serbia, and the Netherlands, which complicates efforts to track the group’s activities. The group’s preference for using multiple hosting providers, including EstNOC OY and MivoCloud, further enhances their ability to evade detection and stay operational even if some of their infrastructure is taken down. Another significant technical aspect of COLDWASTREL’s operations is their ability to target specific regions and organizations. For example, many of their malicious domains are associated with Ukraine, suggesting that their campaigns may be tied to geopolitical events or state-sponsored efforts. This focus on politically sensitive targets allows the group to gather valuable intelligence and disrupt operations that could have significant global implications. By leveraging their technical expertise and access to a broad network of resources, COLDWASTREL has been able to execute sophisticated cyber espionage campaigns that have gone undetected for years. In conclusion, COLDWASTREL’s technical operations are marked by a blend of sophisticated malware, advanced phishing tactics, and deceptive infrastructure. Their ability to infiltrate networks, maintain persistence, and exfiltrate sensitive data positions them as a significant threat to organizations involved in politically sensitive activities. The group’s operations demonstrate a high level of technical sophistication, and their continued activity highlights the growing need for organizations to invest in advanced security measures to defend against such targeted and persistent attacks. As the threat landscape continues to evolve, COLDWASTREL remains one of the most formidable cyber espionage groups operating today.  
References:
  • COLDWASTREL of space
  • SPEAR-PHISHING CASES FROM EASTERN EUROPE A TECHNICAL BRIEF
Tags: COLDWASTRELCybercriminalsGovernmentNGOPDFPhishingRussiaThreat ActorsUkraineWhite Dev 185
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Google Removes 352 ‘IconAds’ Fraud Apps

Malicious Firefox Add Ons Steal Crypto Keys

Browser Cache Attack Bypasses Web Security

PDFs Deliver QR Codes in Callback Scams

Critical Sudo Flaws Expose Linux Systems

Unkillable Mac Malware From North Korea

Subscribe to our newsletter

    Latest Incidents

    Tech Incubator IdeaLab Discloses Data Breach

    Brazil’s CIEE One Exposes 248,000 Records

    McLaughlin & Stern Discloses Data Breach

    Cyberattack Hits Medtech Firm Surmodics

    Rhysida Ransomware Hits German Charity WHH

    Hacker Accesses Max Financial’s User Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial