Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Nation-State

Russian APT Switches to New Backdoor After Malware Exposed by Researchers

Star Blizzard started using the NoRobot (BaitSwitch) and MaybeRobot (SimpleFix) malware after public reporting on the LostKeys malware.

Blizzard Russia APT

The Russian state-sponsored APT known as Star Blizzard has been using a new backdoor in attacks after its LostKeys malware was detailed in a public report in June, Google says.

Also tracked as Callisto, ColdRiver, Seaborgium, and UNC4057, Star Blizzard has been active since at least 2019, and has been publicly linked to Russia’s Federal Security Service (FSB) by the US in December 2023.

In a June report, Google detailed how the APT was using the ClickFix technique to deliver the LostKeys malware as part of a multi-stage infection chain that also involved the use of a first-stage PowerShell script.

Within days of the report, Star Blizzard started using new malware families in attacks and never deployed LostKeys again, Google now says. The APT also dropped the PowerShell infection chain, opting instead to rely on the victim’s execution of a malicious DLL via rundll32.

Initially analyzed by Zscaler in September, the recent Star Blizzard attacks continue to rely on ClickFix for infection: victims are lured to pages masquerading as information resources for members of civil society and think tanks in Russia and convinced to execute malicious commands in the Windows Run box.

The commands result in a malicious DLL being downloaded on the victim’s system. Dubbed NoRobot by Google (and BaitSwitch by Zscaler), the DLL has been designed to retrieve the next-stage payload and achieve persistence.

Advertisement. Scroll to continue reading.

Earlier versions of NoRobot, Google says, were fetching a Python backdoor dubbed YesRobot, which had limited functionality and made typical backdoor functionality cumbersome to implement.

Thus, the APT abandoned YesRobot in favor of a new backdoor, MaybeRobot (tracked as SimpleFix by Zscaler), also deployed via NoRobot.

Deployed as a heavily obfuscated PowerShell script, the malware has support for three commands provided by its operator. Based on these, it can execute files, commands, and PowerShell blocks.

Likely built to replace YesRobot, and offering increased flexibility in performing activities on the infected systems, MaybeRobot has minimal built-in functionality and still requires an operator for more complex operations.

Between May and September 2025, Star Blizzard made multiple changes to NoRobot, mainly focused on evading detection, and updated its infection chain as it transitioned to deploying MaybeRobot as the final stage.

“Over the course of this period of time, Coldriver simplified their malware infection chain and implemented basic evasion techniques, such as rotating infrastructure and file naming conventions, paths where files were retrieved from, how those paths were constructed, changing the export name and changing the DLL name,” Google explains.

Related: Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US

Related: Dutch Teens Arrested for Allegedly Helping Russian Hackers

Related: US Offers $10 Million for Three Russian Energy Firm Hackers

Related: Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.