{"id":5503,"date":"2025-10-22T12:04:10","date_gmt":"2025-10-22T12:04:10","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5503"},"modified":"2025-10-22T12:04:10","modified_gmt":"2025-10-22T12:04:10","slug":"i-am-not-a-robot-russian-hackers-use-fake-captcha-lures-to-deploy-espionage-tools","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5503","title":{"rendered":"\u2018I am not a robot\u2019: Russian hackers use fake CAPTCHA lures to deploy espionage tools"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Russian state-backed hackers are using fake \u201cI am not a robot\u201d CAPTCHA pages to deliver new strains of espionage malware, according to Google Cloud\u2019s Threat Intelligence Group (GTIG), marking a fresh evolution in tactics by the ColdRiver group that has long targeted Western governments, think tanks, and media organizations.<\/p>\n<p>The group, also known as Star Blizzard, UNC4057, or Callisto, has replaced its previously exposed LostKeys malware with a new suite of tools, including NOROBOT, YESROBOT, and MAYBEROBOT.<\/p>\n<p>These programs can evade detection through multi-stage delivery chains and encrypted payloads. Google said the shift came just days after the company published technical details on LostKeys earlier this year.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/1294806\/russian-hacker-coldriver-extends-tactics-to-include-custom-malware.html?utm=hybrid_search\">ColdRiver<\/a>\u2019s latest campaign uses social engineering tactics known as \u201cClickFix,\u201d tricking victims into running malicious code disguised as CAPTCHA verification steps.<\/p>\n<p>\u201cNOROBOT and its preceding infection chain have been subject to constant evolution \u2014 initially simplified to increase chances of successful deployment, before re-introducing complexity by splitting cryptography keys,\u201d <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/new-malware-russia-coldriver\" target=\"_blank\" rel=\"noopener\">GTIG said<\/a>. \u201cThe shift back to more complex delivery chains increases the difficulty of tracking their campaigns. This constant development highlights the group\u2019s efforts to evade detection systems for their delivery mechanism for continued intelligence collection against high-value targets.\u201d<\/p>\n<p>The technique shows a growing trend in <a href=\"https:\/\/www.csoonline.com\/article\/3546864\/doj-seizes-41-russian-controlled-domains-in-cyber-espionage-crackdown.html?utm=hybrid_search\">state-sponsored operations<\/a> that combine psychological manipulation with stealthy modular malware to bypass enterprise defenses.<\/p>\n<p>\u201cColdRiver\u2019s quick pivot from exposed infrastructure to new delivery methods like fake CAPTCHAs reveals a lot about their capabilities,\u201d said <a href=\"https:\/\/www.hfsresearch.com\/team\/akshat-tyagi\/\">Akshat Tyagi<\/a>, associate practice leader at HFS Research. \u201cThey are operationally very agile because, practically within weeks, they shifted infrastructure, rewrote delivery mechanisms, and deployed new payloads. It seems they are a well-funded and well-resourced team. They likely have a modular architecture allowing them to replace components, and they also have access to global engineering talent.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Inside the findings<\/h2>\n<p>Google said the new malware families have been in active development from May through September 2025, with the attackers repeatedly refining their tools to evade detection. The pace of updates shows ColdRiver\u2019s ability to rebuild its toolset almost immediately after public exposure.<\/p>\n<p>The earliest NOROBOT sample used a cryptographic scheme that split the decryption key across multiple components that had to be recombined in a specific order to decrypt the final payload.<\/p>\n<p>YESROBOT is described in Google\u2019s report as a minimal Python backdoor that requires every command to be valid Python, making basic functions such as downloading files or retrieving documents more cumbersome to implement. The latter NOROBOT build was drastically simplified, fetching a single file that, in observed cases, installed a logon script to establish persistence.<\/p>\n<p>\u201cThe specific changes made between NOROBOT variants highlight the group\u2019s persistent effort to evade detection systems while ensuring continued intelligence collection against high-value targets,\u201d the report said.<\/p>\n<h2 class=\"wp-block-heading\">Evolving tactics and strategies<\/h2>\n<p>Analysts said ColdRiver, which for years focused on credential theft and email account compromise, is shifting toward multi-stage intrusions that rely on users to execute malicious code.<\/p>\n<p>By using ClickFix pages that mimic CAPTCHA verification screens, the group can bypass email security filters and deliver malware directly to victims\u2019 devices, increasing the likelihood of infection.<\/p>\n<p>\u201cAt this stage, it is difficult to expect end users to identify and discard fraudulent CAPTCHA, since CAPTCHA is part of the standard access process,\u201d said cybersecurity analyst <a href=\"https:\/\/www.linkedin.com\/in\/sunilvarkey1\/\">Sunil Varkey<\/a>. \u201cThe only option is to monitor behavioral changes, living-off-the-land telemetry, and abnormal activity through tools such as EDR and NDR. Organizations need to understand how users and hosts behave in specific scenarios and monitor deviations, which requires having a strong baseline and enforcing it.\u201d<\/p>\n<p>This shift from simple phishing to multi-stage, interactive attacks shows ColdRiver\u2019s ability to adapt to improved cyber awareness among users. Traditional lures are less effective as people become cautious about clicking suspicious links, but CAPTCHA pages still feel familiar and safe, a trust ColdRiver has learned to exploit.<\/p>\n<p>\u201cTactically, it indicates ColdRiver\u2019s focus on operational security (OPSEC) and stealth,\u201d said <a href=\"https:\/\/sure-shield.com\/our-teams\/sanjaya-kumar\/\">Sanjaya Kumar<\/a>, CEO of SureShield. \u201cThe malware uses encrypted communications and anti-analysis techniques, allowing prolonged access for months without detection. Target selection remains high value, including NGOs, dissidents, policy advisors, and Western officials, but the CAPTCHA method also extends to softer targets in think tanks and academia, where quick credential theft can lead to espionage chains.\u201d<\/p>\n<p>For defenders, it underscores the need to move beyond traditional two-factor authentication and adopt behavioral and context-aware monitoring to identify stealthy, user-assisted intrusions.<\/p>\n<h2 class=\"wp-block-heading\">Defense options for enterprises<\/h2>\n<p>Because the attackers target specific organizations and individuals, they can use server-side filtering to deliver malware only to selected victims, making large-scale detection difficult, analysts said. Detection is further complicated when global security vendors have not yet developed or prioritized signatures for the new attacks.<\/p>\n<p>\u201cDefenders need to be fully aware that this isn\u2019t a basic phishing gang using off-the-shelf malware,\u201d Varkey said. \u201cIt appears to be state-linked or state-sponsored, with significant resources and the ability to pivot to new tools and delivery methods rapidly. Defenders cannot depend solely on IOCs, and organizations may need to strengthen their security posture to protect high-value assets significantly.\u201d<\/p>\n<p>Kumar added that effective defense requires a layered and behavior-focused approach that uses tools to monitor anomalous PowerShell execution, unusual network calls to command-and-control servers, or fileless malware patterns.<\/p>\n<p>Security teams should establish baselines for normal activity and generate alerts when deviations occur, such as unexpected login attempts from foreign IP addresses or rapid data exfiltration. \u201cFocus on building a zero-trust architecture and enforce least-privilege access and micro-segmentation to limit lateral movement,\u201d Kumar said. \u201cContinuous vulnerability management scans to patch endpoints before exploitation, combined with security awareness training on interactive phishing (e.g., simulated CAPTCHA attacks), to cut success rates. Incident Responses need to be solidified, so simulate multi-stage attacks to test containment. Proactive cyber hygiene \u2013 regular patching, endpoint hardening, and threat hunting is essential.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Russian state-backed hackers are using fake \u201cI am not a robot\u201d CAPTCHA pages to deliver new strains of espionage malware, according to Google Cloud\u2019s Threat Intelligence Group (GTIG), marking a fresh evolution in tactics by the ColdRiver group that has long targeted Western governments, think tanks, and media organizations. The group, also known as Star [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":5504,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-5503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5503"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5503"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5503\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/5504"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}