Russian Coldriver APT expands tactics to deliver SPICA backdoor in targeted campaigns

Russian Coldriver APT expands tactics to deliver SPICA backdoor in targeted campaigns

A Russian state-baked hacker group known as Coldriver has expanded its operations to include the use of a custom backdoor called ‘SPICA’ in targeted campaigns against Western officials, according to a new report from Google’s Threat Analysis Group (TAG).

The cyberespionage outfit, also tracked as UNC4057, Star Blizzard, and Callisto, is primarily focused on credential phishing against entities in Ukraine, high-profile individuals in non-governmental organizations (NGO’s), former intelligence and military officers, and NATO governments.

To gain the trust of their targets, Coldriver employs sophisticated impersonation accounts, posing as experts or individuals affiliated with the target, establishing a rapport before launching phishing campaigns.

In its most recent attack, the group has been observed delivering malware via lures in the form of PDF documents. As early as November 2022, the threat actor has been sending benign PDF documents to targets from impersonation accounts, the TAG team said.

The lure document contains the encrypted text and if the victim wants to read it they are provided with a link to a “decryption” utility hosted on a cloud storage site. However, this utility is, in fact, a backdoor known as SPICA, granting the threat actor access to the victim's machine.

SPICA, the first custom malware attributed to Coldriver, is written in the Rust programming language and uses JSON over web sockets for command and control (C2). Its capabilities include executing arbitrary shell commands, stealing cookies from various browsers, uploading and downloading files, perusing the filesystem, and enumerating and exfiltrating documents.

TAG first spotted SPICA in September 2023, however, the researchers believe that the group has been using the malware since at least November 2022.

Notably, SPICA establishes persistence through an obfuscated PowerShell command, creating a scheduled task named “CalendarChecker.” TAG said they identified four different variants of the initial “encrypted” PDF lure but retrieved only a single instance of SPICA. The group suspects that there may be multiple versions of the SPICA backdoor, each with a different embedded decoy document to match the lure sent to specific targets.


Back to the list

Latest Posts

Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

The organization says the decision to discontinue expiration emails is driven by rising operational costs, increasing privacy concerns, and efforts to simplify its infrastructure.
30 June 2025
UAC-0226 upgrades Giftedcrook malware for intelligence gathering on Ukraine

UAC-0226 upgrades Giftedcrook malware for intelligence gathering on Ukraine

V1.3 comes with expanded ability to exfiltrate a wide range of sensitive files.
30 June 2025
Crypto investment fraud ring dismantled in Spain after defrauding 5K victims worldwide

Crypto investment fraud ring dismantled in Spain after defrauding 5K victims worldwide

The Guardia Civil arrested five individuals who are believed to be key members of the international criminal network.
30 June 2025