Russian-backed hackers are stealing information using malware disguised as PDF encryption tools.by Threat Analysis Group ReportColddrive sends encrypted PDFs to victims.
When unsuspecting victims reply that they cannot view the PDF, the group sends a download link disguised as an encryption tool. But it’s really malware.
According to the Threat Analysis Group (TAG), a specialized team within Google that focuses on identifying and countering a variety of security threats, Colddriver primarily addresses the following threats: Phishing attack. Therefore, this new malware-based attack is relatively new territory for this group.
Colddriver backdoor malware attack
The attack itself is very simple. As mentioned above, the attacker sends an encrypted PDF and, when the victim responds, sends an “encryptor” containing malware. The “encryption tool” may even display fake PDF documents to actually sell the ruse. However, he actually backdoors the device with malware called Spica.
Russian malware compromises Department of Energy and other federal agencies
Spica steals cookies from Google Chrome, FireFox, Edge, and Opera to obtain your information. According to Google, Colddriver has been in use since September 2023, although there are instances where Colddriver dates back to 2022.
Google announced that it has added all domains, websites, and files involved in the attack to its Safe Browsing service. The company also notified targeted users that they were at risk of an attack.

data on the internet (Kurt “Cyber Guy” Knutson)
Read more: How cryptocurrency scammers regularly use them to infect Macs with malware
how to protect yourself
1. Do not download pirated software. It’s not worth the risk to download pirated software. This exposes your device to potential security threats such as viruses and spyware. If someone sends you a download link via email, make sure it comes from a trusted source and scan it. Downloading software from a trusted app store is a surefire way to protect your device.
2. Don’t click on suspicious links or files. If you come across a link that looks suspicious, misspelled, or unfamiliar, don’t click it. Instead, consider visiting the company’s website directly by entering the web address manually or by searching with a trusted search engine. In most cases, The first or second result you see is legitimate. If you see the word “Sponsored” above the search results, wait a moment before clicking on it, and then consider clicking on the result below it.

A hacker is trying to steal your data (Kurt “Cyber Guy” Knutson)
3. Update your device regularly with software. regularly Update your device software This is critical for security as it ensures you receive the latest patches, bug fixes, and security enhancements. These updates help protect your device from vulnerabilities and potential threats that could be exploited by malicious attackers.
4. Use good antivirus software. The best way to protect yourself from clicking on malicious links that install malware that can access your personal information is to install antivirus protection on all your devices. This can also alert you to phishing emails and ransomware scams. Get my picks for the best antivirus protection products of 2024 for your Mac, Windows, Android, and iOS devices.
More information: How hackers exploit Windows Smart Screen vulnerabilities to spread malware
What to do if you get hacked
If a hack has already occurred and you have been hacked, you should take immediate action to minimize the damage and protect your device. Below are some steps you can take.
change password
If hackers have recorded your passwords, they can access your online accounts and steal your data and money. You should change the passwords for all important accounts, such as email, banking, and social media, on another device (such as a laptop or desktop). I would like to do this on a separate device so hackers don’t record it. Set a new password on your hacked device. You should also use strong, unique passwords that are difficult to guess or crack.You can also use password manager Generate passwords and store them securely.
Enable two-factor authentication
must be activated two-factor authentication For an extra layer of security.
Monitor your account and transactions
You should regularly check your online accounts and transactions for suspicious or fraudulent activity. If you notice anything unusual, please report it to your service provider or authorities as soon as possible. You should also check your credit report and score for signs of identity theft or fraud.

hacker on the internet (Kurt “Cyber Guy” Knutson)
Use identity theft protection
Identity theft protection companies monitor your personal information, such as your household title, social security number (SSN), phone number, and email address, and alert you if it is used to open an account. It can also help freeze bank and credit card accounts to prevent further misuse by criminals. Check out our tips and recommendations on how to protect yourself from identity theft.
CLICK HERE TO GET FOX BUSINESS ON THE GO
Please contact your bank or credit card company
If a hacker obtains your banking or credit card information, they can use it to make purchases or withdrawals without your consent. You should contact your bank or credit card company and let them know the situation. We can help you freeze or cancel your card, dispute fraudulent charges, or issue a new card.
Alert a contact
If a hacker gains access to your email or social media accounts, they could use them to send spam or emails. phishing message to your contacts. They may also pretend to be you and request money or personal information. You should alert your contacts and warn them not to open or reply to messages from you that seem suspicious or unusual.
Read more: Stealthy backdoor MAC malware that can wipe your files
Cart important points
Hackers also look for ways to break into devices. It’s your job to stay secure and safe while browsing the web. This includes being careful about what you download. Even if you receive a file from a trusted contact, you should still use your caution.
CLICK HERE TO GET THE FOX NEWS APP
Are you worried about further attacks from groups like Colddriver? How can you protect yourself? Please let us know by email. Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter.
Ask your cart a question or let us know your story you’d like us to feature.
Answers to CyberGuy frequently asked questions:
Copyright 2024 CyberGuy.com. All rights reserved.




