Yazılar

Google Uncovers New Russian Malware ‘LOSTKEYS’ Linked to Cold River Hacking Group

Google’s Threat Intelligence Group announced Wednesday the discovery of a new malware strain called “LOSTKEYS”, which has been linked to the Russia-based hacking group Cold River, believed to have ties to the Russian Federal Security Service (FSB).

According to Google researcher Wesley Shields, the malware marks a significant expansion in Cold River’s cyber toolkit, with capabilities that include file theft and system reconnaissance, enabling attackers to gather intelligence on high-profile individuals and institutions.

LOSTKEYS represents a new development in the toolset used by Cold River,” Shields stated in a blog post.

Recent Targeting Activity:

  • Attacks observed in January, March, and April 2025

  • Targets include current and former advisers to Western governments, military personnel, NGOs, journalists, think tanks, and individuals connected to Ukraine

  • Cold River continues to pursue espionage goals in line with Russian strategic interests

Background on Cold River:

Cold River gained notoriety for targeting:

  • Three U.S. nuclear research labs in 2022

  • Private email leaks of former British spymaster Richard Dearlove and other pro-Brexit figures

  • Credential theft campaigns targeting NATO governments and NGOs

The Russian embassy in Washington did not immediately respond to requests for comment.

The revelation underscores ongoing concerns about state-sponsored cyber threats emanating from Russia, particularly amid the ongoing war in Ukraine and heightened geopolitical tensions.

CDW Beats Q1 Estimates as Healthcare and Education Drive Hardware, Software Demand

CDW Corp. (CDW.O) exceeded Wall Street expectations for both revenue and profit in the first quarter of 2025, fueled by strong demand from healthcare, education, and public sector clients for IT hardware, software, and related services.

The Vernon Hills, Illinois-based IT distributor reported net sales of $5.20 billion, surpassing the $4.93 billion estimate (LSEG data), as end-markets showed signs of spending resilience despite ongoing economic uncertainty.

While economic uncertainty continues to persist, certain end-markets experienced improved customer spending during the first quarter,” the company said in a statement.

Segment Highlights:

  • Public segment revenue: $1.88 billion, up 10.3% year-over-year

  • Corporate segment revenue: $2.23 billion, up 6.3%

  • Adjusted EPS: $2.15 vs. $1.96 expected

CDW’s public segment—serving sectors like healthcare and educationwas a key driver of growth, while its corporate business remained the largest contributor overall. The company also noted continued demand for desktops, notebooks, mobile devices, cloud solutions, and cybersecurity services.

CDW partners with major vendors such as Cisco, Dell Technologies, HP, and Microsoft, delivering integrated IT solutions to enterprise, government, and institutional clients across the U.S., U.K., and Canada.

The results underscore CDW’s strong market position and ability to navigate industry headwinds, as organizations continue to prioritize digital transformation, remote access tools, and IT infrastructure upgrades.

Meta Wins $168 Million in Landmark Case Against NSO Group Over WhatsApp Spyware Abuse

Meta Platforms has secured a significant legal victory, winning a $168 million verdict against Israeli spyware company NSO Group in a long-running lawsuit over the unauthorized use of WhatsApp servers to deploy spyware on users’ devices. The ruling marks the first major courtroom win against a surveillance firm for the deployment of illegal spyware.

A California jury awarded Meta $444,719 in compensatory damages and $167.3 million in punitive damages, capping a six-year legal battle that began with a 2019 lawsuit. In December, a federal judge had already ruled that NSO unlawfully exploited a WhatsApp vulnerability to implant surveillance software.

Meta hailed the outcome as a step forward for privacy and security”, adding that the verdict sets a precedent in holding spyware developers accountable.

A Rare Glimpse Into the Spyware Industry

The trial revealed rare insights into NSO’s operations:

  • Between 2018 and 2020, NSO charged governments $7 million to hack up to 15 devices simultaneously.

  • Cross-border hacking features cost an additional $1–2 million.

  • NSO maintained a 140-person research team with a $50 million budget, some of which was used to exploit smartphone security flaws.

  • Court testimony confirmed customers included Uzbekistan, Saudi Arabia, and Mexico.

Despite NSO’s claim that its software is intended to fight terrorism and crime, human rights advocates, such as Natalia Krapiva of Access Now, labeled the firm a poster child for surveillance abuses.” She called the ruling a signal to the spyware industry: There will be consequences if you act carelessly or brazenly.”

Continued Secrecy and Legal Resistance

NSO has indicated plans to appeal the verdict, saying it would pursue all legal remedies. Much of the case remained shrouded in secrecy, with Judge Phyllis Hamilton criticizing the firm for withholding evidence and ignoring court orders. The Israeli government even intervened, seizing documents to prevent their disclosure in U.S. courts.

This case, which reached as far as the U.S. Supreme Court, has been closely watched by privacy advocates, surveillance industry players, and governments worldwide, as it underscores both the legal vulnerability of spyware firms and the growing demand for greater accountability in cyber surveillance practices.