Skip to main content

Updates Arsenal with BAITSWITCH and SIMPLEFIX

Medium
Published: Wed Sep 24 2025 (09/24/2025, 15:56:13 UTC)
Source: AlienVault OTX General

Description

A new multi-stage ClickFix campaign, attributed to the Russia-linked APT group COLDRIVER, has been discovered targeting Russian civil society members. The campaign employs social engineering techniques to trick users into executing malicious commands, leading to the deployment of two new malware families: BAITSWITCH (a downloader) and SIMPLEFIX (a PowerShell-based backdoor). The attack chain involves a fake Cloudflare Turnstile checkbox, persistence establishment, and data exfiltration. COLDRIVER's tactics include using server-side checks, obfuscation techniques, and targeting specific file types for intelligence collection. The group's focus on NGOs, human rights defenders, and Russian exiles aligns with their known victimology.

AI-Powered Analysis

AILast updated: 09/24/2025, 19:48:37 UTC

Technical Analysis

The threat involves a sophisticated multi-stage malware campaign known as ClickFix, attributed to the Russia-linked advanced persistent threat (APT) group COLDRIVER. This campaign targets Russian civil society members, including NGOs, human rights defenders, and exiles, consistent with COLDRIVER's known victimology. The attack chain begins with social engineering tactics that trick victims into executing malicious commands. A key element of the deception is a fake Cloudflare Turnstile checkbox designed to appear legitimate and lure users into interaction. Once the victim executes the commands, two new malware families are deployed: BAITSWITCH, a downloader responsible for fetching additional malicious payloads, and SIMPLEFIX, a PowerShell-based backdoor that establishes persistence on the infected system and facilitates data exfiltration. COLDRIVER employs advanced evasion techniques such as server-side checks to verify the environment before payload delivery, obfuscation to hinder analysis, and selective targeting of specific file types to maximize intelligence collection. The campaign's infrastructure includes multiple malicious domains used for command and control (C2) and payload hosting. Although no known exploits are reported in the wild for this campaign, the use of PowerShell backdoors and downloader malware indicates a high level of sophistication and operational security by the threat actor. The campaign's focus on social engineering and targeted victim profiles highlights the importance of user awareness and tailored defenses against such threats.

Potential Impact

For European organizations, particularly those involved in human rights advocacy, NGOs, and entities supporting Russian exiles or civil society, this threat poses a significant risk. The deployment of a PowerShell-based backdoor like SIMPLEFIX can lead to unauthorized access, data theft, and long-term espionage activities. The downloader BAITSWITCH can facilitate further malware infections, potentially compromising the confidentiality and integrity of sensitive information. Given the targeted nature of the campaign, European organizations with ties to Russian civil society or those hosting related activities may be at risk of espionage or disruption. Additionally, the use of social engineering and fake security mechanisms (e.g., fake Cloudflare Turnstile) increases the likelihood of successful compromise if users are not adequately trained. The persistence mechanisms and obfuscation techniques complicate detection and remediation, potentially leading to prolonged undetected presence within networks. This could result in reputational damage, loss of sensitive data, and operational disruption, especially for organizations engaged in politically sensitive work.

Mitigation Recommendations

1. Implement targeted user awareness training focusing on social engineering tactics, specifically educating users about fake security prompts such as counterfeit Cloudflare Turnstile checkboxes. 2. Enforce strict PowerShell execution policies and enable PowerShell logging and transcription to detect anomalous script execution indicative of backdoors like SIMPLEFIX. 3. Employ endpoint detection and response (EDR) solutions capable of identifying obfuscated scripts and downloader behaviors associated with BAITSWITCH. 4. Monitor network traffic for connections to known malicious domains listed in the indicators (e.g., blintepeeste.org, captchanom.top) and block or isolate suspicious communications. 5. Conduct regular threat hunting exercises focusing on persistence mechanisms and unusual file access patterns, especially targeting specific file types that COLDRIVER aims to collect. 6. Apply network segmentation and least privilege principles to limit lateral movement and data exfiltration capabilities. 7. Maintain updated threat intelligence feeds to stay informed about evolving COLDRIVER tactics and indicators of compromise. 8. For organizations supporting Russian civil society, consider enhanced operational security measures, including multi-factor authentication and encrypted communications.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/coldriver-updates-arsenal-baitswitch-and-simplefix"]
Adversary
COLDRIVER
Pulse Id
68d4149d18e6eb7158e2d30c
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash16a79e36d9b371d1557310cb28d412207827db2759d795f4d8e27d5f5afaf63f
hash62ab5a28801d2d7d607e591b7b2a1e9ae0bfc83f9ceda8a998e5e397b58623a0
hash87138f63974a8ccbbf5840c31165f1a4bf92a954bacccfbf1e7e5525d750aa48

Domain

ValueDescriptionCopy
domainblintepeeste.org
domaincaptchanom.top
domainpreentootmist.org
domainsouthprovesolutions.com

Threat ID: 68d44a34f2b114103f06513a

Added to database: 9/24/2025, 7:44:52 PM

Last enriched: 9/24/2025, 7:48:37 PM

Last updated: 9/25/2025, 10:11:29 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats