Zettawise Cyber Range focusses on assessing the vulnerabilities involved in the process safety, system reliability and physical reliability of the Operating Technology of the Critical Infrastructures.

Member of :

Zettawise Consulting is a part of the joint workforce of SASTRA (RRU, Ministry of Home Affairs, Govt of India) under the aegis of “AtmaNirbhar and AtmaSurakshit Bharat Mission” of Govt of India.

In a significant cyber threat revelation, Google’s GTIG has exposed “LOSTKEYS,” a complex new malware believed to be used by Cold River, a Kremlin-aligned hacker collective with suspected ties to Russia’s FSB. 

First reported by Reuters and detailed in a blog post on Wednesday, LOSTKEYS represents a notable evolution in Cold River’s cyber arsenal, enabling the theft of files and system data in its continued campaign against geopolitical rivals. 

The Cold River Group: Operating in the Shadows, Striking Strategic Assets 

Cybersecurity professionals say Cold River, an elusive hacking group with multiple aliases, is focused on undermining Western governments and institutions in pursuit of Russia’s strategic objectives. 

Between January and April 2025, Cold River carried out a wide-ranging cyber campaign—documented by Google—that focused on advisors to Western governments, members of the press, global policy think tanks, NGOs, and Ukrainian-related targets. 

Cold River first drew widespread scrutiny in 2022, when it was linked to breaches at U.S. nuclear research institutions and a leak of sensitive emails from prominent British figures tied to Brexit. 

LOSTKEYS: A Stealthy Cyber Tool Designed for Espionage 

GTIG researcher Wesley Shields says LOSTKEYS reflects a significant evolution in Cold River’s digital toolkit. Unlike its simpler predecessors, LOSTKEYS uses a layered approach to:
 
  • Harvest sensitive files from infected machines

  • Collect technical data for profiling victims

  • Establish hidden links to external servers for ongoing access 

  •  
LOSTKEYS is believed to be part of a broader spear-phishing campaign, in which attackers use fake but convincing emails to spread the malware. Once deployed, it discreetly monitors systems and siphons data in the background, experts warn. 

With LOSTKEYS raising red flags, Google advises potential targets to harden defenses through software updates, threat detection systems, and phishing awareness initiatives. Organizations dealing in defense or geopolitical intelligence are particularly at risk. According to experts, the malware illustrates how modern cyber campaigns increasingly fuse intelligence-gathering with broader influence strategies.