logo
#

Latest news with #LOSTKEYS

Google uncovers Russian malware 'LOSTKEYS' stealing files and system data
Google uncovers Russian malware 'LOSTKEYS' stealing files and system data

USA Today

time08-05-2025

  • Politics
  • USA Today

Google uncovers Russian malware 'LOSTKEYS' stealing files and system data

Google uncovers Russian malware 'LOSTKEYS' stealing files and system data Show Caption Hide Caption Justice Department pushes to break up Google's search monopoly The Justice Department has begun a three-week hearing to determine how to address Google's illegal monopoly in internet search, with the government calling for major structural changes. unbranded - Newsworthy Alphabet's Google GOOGL.O said on Wednesday it has identified new malware called "LOSTKEYS" tied to the Russian-based hacking group Cold River, which is capable of stealing files and sending system information to attackers. The malware "marks a new development in the toolset" of Cold River, Wesley Shields, a researcher with Google Threat Intelligence Group, said in a blog. Artificial intelligence: Will AI replace Google on your iPhone? Apple thinks so. Here's why. Cold River, a name used to track hacking campaigns previously linked to Russia's Federal Security Service, is primarily known for stealing login credentials for high-profile targets, including those within NATO governments, non-governmental organizations and former intelligence and diplomatic officers, Shields said in the blog. The central goal was intelligence collection in support of Russian strategic interests. Recent targets, observed in January, March and April 2025, include current and former advisers to Western governments and militaries, as well as journalists, think tanks and NGOs, and unnamed individuals connected to Ukraine, according to the blog. The Russian embassy in Washington did not immediately respond to a request for comment. Past high-profile campaigns have included targeting three nuclear research laboratories in the U.S. in the summer of 2022, and the publishing of the private emails of former British spymaster Richard Dearlove, alongside pro-Brexit individuals, in an operation revealed in May 2022. Reporting by Deborah Sophia in Bengaluru and AJ Vicens in Detroit; Editing by Arun Koyyur and Emelia Sithole-Matarise

Google identifies new malware linked to Russia-based hacking group
Google identifies new malware linked to Russia-based hacking group

Straits Times

time07-05-2025

  • Straits Times

Google identifies new malware linked to Russia-based hacking group

New malware called 'LOSTKEYS' is tied to the Russian-based hacking group Cold River, and is capable of stealing files. PHOTO: REUTERS WASHINGTON - Alphabet's Google said on May 7 it has identified new malware called 'LOSTKEYS', tied to the Russian-based hacking group Cold River, which is capable of stealing files and sending system information to attackers. The malware 'marks a new development in the toolset' of Cold River, Mr Wesley Shields, a researcher with Google Threat Intelligence Group, said in a blog. Cold River, a name used to track hacking campaigns previously linked to Russia's Federal Security Service, is primarily known for stealing login credentials for high-profile targets, including those within Nato governments, non-governmental organisations and former intelligence and diplomatic officers, Mr Shields said in the blog. The central goal was intelligence collection in support of Russian strategic interests. Recent targets, observed in January, March and April 2025, include current and former advisers to Western governments and militaries, as well as journalists, think-tanks and NGOs, and unnamed individuals connected to Ukraine, according to the blog. The Russian embassy in Washington did not immediately respond to a request for comment. Past high-profile campaigns have included targeting three nuclear research laboratories in the US in the summer of 2022, and the publishing of the private emails of former British spymaster Richard Dearlove, alongside pro-Brexit individuals, in an operation revealed in May 2022. REUTERS Join ST's Telegram channel and get the latest breaking news delivered to you.

Google uncovers ‘LOSTKEYS' malware linked to Russian-backed Cold River hackers
Google uncovers ‘LOSTKEYS' malware linked to Russian-backed Cold River hackers

Mint

time07-05-2025

  • Politics
  • Mint

Google uncovers ‘LOSTKEYS' malware linked to Russian-backed Cold River hackers

Google has uncovered a new strain of malware, dubbed "LOSTKEYS", believed to be the work of Cold River, a Russian-aligned hacking group reportedly connected to the country's Federal Security Service (FSB), reported Reuters. According to a blog post published on Wednesday by Google's Threat Intelligence Group (GTIG), the newly identified malware represents a significant advancement in Cold River's cyber capabilities. LOSTKEYS is designed to steal files and transmit system data back to its operators, expanding the group's known toolkit for espionage. Wesley Shields, a researcher at GTIG, stated that the malware signals 'a new development in the toolset' used by the group, which has a history of targeting sensitive political and strategic entities. Cold River, also known under various aliases, has been linked to previous cyber operations aimed at high-profile Western individuals and institutions. The group's primary mission, experts say, is the collection of intelligence that furthers Russian geopolitical interests. Recent surveillance by Google's researchers shows that, between January and April 2025, Cold River targeted advisers—both current and former—to Western governments and military institutions. Other victims reportedly included journalists, international think tanks, non-governmental organisations, and individuals associated with Ukraine. The Russian embassy in Washington has yet to respond to requests for comment on the allegations. Cold River has previously drawn attention for its audacious operations. In mid-2022, the group was accused of targeting three nuclear research facilities in the United States. Later that year, it was implicated in the leaking of private emails belonging to former British intelligence chief Sir Richard Dearlove, alongside other individuals associated with pro-Brexit activities. Cybersecurity analysts warn that the emergence of LOSTKEYS underscores a broader escalation in cyber espionage tactics being employed by state-linked actors. Google has urged targeted organisations and individuals to remain vigilant and adopt updated security measures to mitigate potential risks.

Google reveals details of Russia-based hacking group linked new malware 'LOSTKEYS'. What users should know?
Google reveals details of Russia-based hacking group linked new malware 'LOSTKEYS'. What users should know?

Time of India

time07-05-2025

  • Time of India

Google reveals details of Russia-based hacking group linked new malware 'LOSTKEYS'. What users should know?

Live Events FAQs (You can now subscribe to our (You can now subscribe to our Economic Times WhatsApp channel Alphabet's Google said on Wednesday it has identified new malware called "LOSTKEYS" tied to the Russia-based hacking group Cold River, which is capable of stealing files and sending system information to attackers, as per a malware "marks a new development in the toolset" of Cold River, Wesley Shields, a researcher with Google Threat Intelligence Group, said in a blog, Reuters River, a name used to track hacking campaigns previously linked to Russia's Federal Security Service, is primarily known for stealing login credentials for high-profile targets, including those within NATO governments, non-governmental organizations and former intelligence and diplomatic officers, Shields said in the blog. The central goal was intelligence collection in support of Russian strategic targets, observed in January, March and April 2025, include current and former advisers to Western governments and militaries, as well as journalists, think tanks and NGOs, and unnamed individuals connected to Ukraine, according to the Russian embassy in Washington did not immediately respond to a request for high-profile campaigns have included targeting three nuclear research laboratories in the U.S. in the summer of 2022, and the publishing of the private emails of former British spymaster Richard Dearlove, alongside pro-Brexit individuals, in an operation revealed in May 2022.A1. Google is owned by Alphabet.A2. The name of Russia-based hacking group is Cold River.

Google's parent company Alphabet shares plunge over 5% amid AI search competition, malware threats
Google's parent company Alphabet shares plunge over 5% amid AI search competition, malware threats

Time of India

time07-05-2025

  • Business
  • Time of India

Google's parent company Alphabet shares plunge over 5% amid AI search competition, malware threats

Shares of Alphabet Inc., the parent company of Google, plunged more than 5% on Wednesday following revelations from a federal antitrust trial and developments tied to cybersecurity and energy infrastructure. Tired of too many ads? go ad free now As of 12:17 p.m., Alphabet Inc.'s Class C stock was trading at $151.41, marking a sharp decline of $13.79 or 8.35% for the day. At the heart of the market reaction was testimony by Eddy Cue, Apple's senior vice president of services, who told a Washington court that Google's search traffic on Apple products declined last month. Cue attributed the drop to growing competition from AI-powered search alternatives such as ChatGPT and Perplexity, signalling a potential shift in user behaviour away from traditional search engines. Meanwhile, Google disclosed it has identified a new strain of malware dubbed 'LOSTKEYS,' linked to the Russia-based hacking group Cold River. According to Wesley Shields of the Google Threat Intelligence Group, the malware is capable of stealing files and transmitting system information to attackers. Shields noted that LOSTKEYS represents a new advancement in Cold River's arsenal. Cold River, which has ties to Russia's Federal Security Service, has been associated with numerous cyber campaigns targeting high-profile Western individuals and organizations, including NATO governments, NGOs, former intelligence officers, and individuals with connections to Ukraine. Recent activity from the group was observed as recently as January, March, and April 2025. A notable past operation included the targeting of U.S. nuclear research labs in 2022 and the leak of private emails from former British intelligence chief Richard Dearlove. Meanwhile, Google announced a major partnership with nuclear developer Elementl Power to construct three advanced nuclear power plants in the United States. Tired of too many ads? go ad free now Each facility is expected to produce at least 600 megawatts of electricity—enough to power a large-scale data center—as tech companies scramble to meet the surging energy demands brought on by the generative AI boom. Google will provide early-stage capital for the projects, which will be developed in collaboration with utility and regulatory partners to secure appropriate locations. Amanda Peterson Corio, Google's Global Head of Data Center Energy, said the initiative reinforces the company's goal of strengthening the energy grid. She emphasized that advanced nuclear energy offers 'reliable, baseload, 24/7 energy' crucial for supporting AI and innovation. The International Energy Agency (IEA) forecasts that electricity usage by data centres will more than double by 2030, posing significant challenges to power infrastructure—challenges this partnership seeks to address.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store