Cold River

Description

(Lastline) While reviewing some network anomalies, we recently uncovered Cold River, a sophisticated threat actor making malicious use of DNS tunneling for command and control activities. We have been able to decode the raw traffic in command and control, find sophisticated lure documents used in the campaign, connect other previously unknown samples, and associate a number of legitimate organizations whose infrastructure is referenced and used in the campaign.

The campaign targets Middle Eastern organizations largely from the Lebanon and United Arab Emirates, though, Indian and Canadian companies with interests in those Middle Eastern countries are also targeted. There are new TTPs used in this attack – for example Agent_Drable is leveraging the Django python framework for command and control infrastructure, the technical details of which are outlined later in the blog.

Names

NameName-Giver
Cold RiverLastline
Nahr el baredoriginal place
Nahr Elbardtransliteration
Cobalt EdgewaterSecureWorks
TA446Proofpoint
SeaborgiumMicrosoft
TAG-53Recorded Future
BlueCharlieRecorded Future
Blue CallistoPWC
CalistoSekoia
Star BlizzardMicrosoft
UNC4057Mandiant
IRON FRONTIERSecureWorks
Grey Pro?
Mythic UrsaPalo Alto
Gossamer BearCrowdStrike

Country

State-sponsored, FSB Centre 18: Centre for Information Security (TsIB)

Motivation

  • Information theft and espionage

First Seen

2019

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Other Information

Uuid

00b16489-daf4-4c61-90bf-0ffba2400e98

Last Card Change

2025-06-28