> Back to All Posts

LOSTKEYS Malware Linked to Cold River, Google Uncovers

Lostkeys Malware

In an alarming development for global cybersecurity, Google has identified a new malware strain dubbed LOSTKEYS. The malware is linked to the notorious Russian-based hacking group Cold River. This is the latest tool in a series of cyberweapons reportedly used for espionage against political, military, and research targets.

What Is LOSTKEYS Malware?

According to Google Threat Intelligence Group (GTIG), LOSTKEYS is a malicious program designed to steal sensitive files and extract system information from infected devices. The malware communicates this data back to its operators, signaling a continued evolution in the Cold River group’s capabilities. Analysts warn that this variant is more sophisticated than previous tools. It can potentially enable deeper infiltration and long-term access to compromised systems.

Who Are Cold River?

Cold River has been linked to Russia’s Federal Security Service (FSB) and is no stranger to the international cybersecurity stage. The group has built a reputation for precision-targeted attacks on NGOs, journalists, government officials, and defense institutions, especially those aligned with NATO or Ukraine.

In 2022, the group was tied to the leak of emails from prominent British figures, including former MI6 chief Richard Dearlove. These incidents appear to be part of a broader campaign to disrupt Western institutions and gather strategic intelligence.

Current Targets and Campaigns

The latest campaign associated with LOSTKEYS has reportedly targeted advisers to Western governments, military personnel, and individuals with links to Ukraine. This activity, observed in early 2025, reflects Cold River’s ongoing interest in geopolitical influence and intelligence gathering amid the continued tensions surrounding Russia’s invasion of Ukraine.

Google’s Role in the Discovery

Google’s GTIG has played a pivotal role in tracking state-sponsored cyber threats. Their identification of LOSTKEYS came as part of an ongoing investigation into advanced persistent threats (APTs). Researchers worked with external partners to dissect the malware, assess its capabilities, and notify potential victims.

This discovery is yet another example of how tech companies are on the front lines of digital warfare, providing crucial early warnings and technical insights to bolster global defenses.

The Bigger Picture: Cyberwarfare in 2025

The emergence of LOSTKEYS underlines how state-sponsored cyber threats are growing more targeted and complex. With each new campaign, groups like Cold River refine their methods, often blurring the lines between espionage and sabotage.

Experts caution that these digital skirmishes could escalate if left unchecked. While the Russian government has not responded to the allegations, the pattern of activity suggests a strategic interest in weakening Western alliances through data theft and psychological operations.

How to Stay Safe

While most individuals may not be direct targets of Cold River, the ripple effects of state-sponsored malware can be wide-reaching. Experts recommend the following best practices:

  • Keep software and operating systems updated.
  • Be cautious with unsolicited emails and attachments.
  • Use strong, unique passwords and enable multi-factor authentication.
  • Stay informed through reputable cybersecurity sources.

Final Thoughts

As tools like LOSTKEYS surface and evolve, the stakes in the cyber domain continue to rise. Whether you’re a government official, a tech worker, or simply someone who values their digital privacy, it’s clear that cybersecurity is no longer optional – it’s essential.

The question now is not if there will be another attack, but when? And how prepared we’ll be when it comes.

 

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.