Russian Coldriver APT expands tactics to deliver SPICA backdoor in targeted campaigns

Russian Coldriver APT expands tactics to deliver SPICA backdoor in targeted campaigns

A Russian state-baked hacker group known as Coldriver has expanded its operations to include the use of a custom backdoor called ‘SPICA’ in targeted campaigns against Western officials, according to a new report from Google’s Threat Analysis Group (TAG).

The cyberespionage outfit, also tracked as UNC4057, Star Blizzard, and Callisto, is primarily focused on credential phishing against entities in Ukraine, high-profile individuals in non-governmental organizations (NGO’s), former intelligence and military officers, and NATO governments.

To gain the trust of their targets, Coldriver employs sophisticated impersonation accounts, posing as experts or individuals affiliated with the target, establishing a rapport before launching phishing campaigns.

In its most recent attack, the group has been observed delivering malware via lures in the form of PDF documents. As early as November 2022, the threat actor has been sending benign PDF documents to targets from impersonation accounts, the TAG team said.

The lure document contains the encrypted text and if the victim wants to read it they are provided with a link to a “decryption” utility hosted on a cloud storage site. However, this utility is, in fact, a backdoor known as SPICA, granting the threat actor access to the victim's machine.

SPICA, the first custom malware attributed to Coldriver, is written in the Rust programming language and uses JSON over web sockets for command and control (C2). Its capabilities include executing arbitrary shell commands, stealing cookies from various browsers, uploading and downloading files, perusing the filesystem, and enumerating and exfiltrating documents.

TAG first spotted SPICA in September 2023, however, the researchers believe that the group has been using the malware since at least November 2022.

Notably, SPICA establishes persistence through an obfuscated PowerShell command, creating a scheduled task named “CalendarChecker.” TAG said they identified four different variants of the initial “encrypted” PDF lure but retrieved only a single instance of SPICA. The group suspects that there may be multiple versions of the SPICA backdoor, each with a different embedded decoy document to match the lure sent to specific targets.


Back to the list

Latest Posts

Russia-linked Coldriver hackers deploy new espionage malware in targeted attacks

Russia-linked Coldriver hackers deploy new espionage malware in targeted attacks

LOSTKEYS is designed to steal sensitive files, harvest system information, and exfiltrate details about running processes.
8 May 2025
Russia-aligned operation manipulates audio and images to impersonate experts

Russia-aligned operation manipulates audio and images to impersonate experts

The operation primarily focused on undermining NATO support for Ukraine and spreading false narratives to disrupt domestic politics in EU member states.
7 May 2025
Global network of DDoS-for-hire services dismantled in international police op

Global network of DDoS-for-hire services dismantled in international police op

The suspects are believed to have administered six now-defunct websites, which operated as stresser or booter services.
7 May 2025