There’s been a lot of focus lately on COLDRIVER, the Russia-linked hacking group. Now, they are working on the next generation of this malware, which has already seen several revisions since May of 2025. This surge in activity indicates an increased operational tempo from the group, raising concerns among cybersecurity experts regarding potential threats to sensitive information and digital infrastructure.
COLDRIVER is responsible for many well-known malware families. One of these is LOSTKEYS, an information stealing tool. Another is the “ROBOT” family, which is thought to enable a number of different cyberattacks. The researchers from Zscaler ThreatLabz have been able to narrow down the ROBOT family and identify specific variants. They have monitored these variants under the titles BAITSWITCH and SIMPLEFIX, targeting NOROBOT and MAYBEROBOT respectively. It was noted that YESROBOT, another malware variant, has only been recorded twice so far, both in late May 2025.
>Details of Recent Malware Developments
Reflecting their strategic operational needs, COLDRIVER’s malware evolution seems to be a design imperative. During January, March, and April 2025 we monitored the first waves of attacks that activated the use of LOSTKEYS. This bold move by American authorities swiftly paved the way for the introduction of the ROBOT family of malware. This timeline paints a picture that the group’s tactics are not only evolving but are increasingly more sophisticated.
Wesley Shields, a cybersecurity expert, highlighted that “NOROBOT and its preceding infection chain have been subject to constant evolution — initially simplified to increase chances of successful deployment, before re-introducing complexity by splitting cryptography keys.” This approach shows a careful planning step by COLDRIVER to prevent detection and to continue access to high-impact targets.
Additionally, Shields noted, “This constant development highlights the group’s efforts to evade detection systems for their delivery mechanism for continued intelligence collection against high-value targets.” These recent changes highlight a critical reality that reinforces the need for strong, enforceable cybersecurity standards to combat these ongoing, ever-evolving threats.
Dutch Authorities Act on COLDRIVER Connections
In a parallel move, the Netherlands’ Public Prosecution Service made a historic announcement yesterday. They are accusing three 17-year-old males of providing COLDRIVER services on behalf of a foreign government. One of these suspects was allegedly in contact with a hacker group directly tied to the Russian government.
Authorities also arrested two other suspects on September 22, 2025. The third suspect is still on house arrest because of her “minimal role” in the transpiration scheme, according to prosecutors. The Dutch government body stated, “There are no indications yet that pressure has been exerted on the suspect who was in contact with the hacker group affiliated with the Russian government.”
The prosecution showed that the one defendant was the constant “leader” telling the others to Their mission was to map the Wi-Fi networks across The Hague. In fact, this mapping is believed to have enabled much more cyber espionage activity. The prosecution stressed that “the information collected has been shared with the client by the former suspect for a fee and can be used for digital espionage and cyber attacks.”
Implications for Cybersecurity
The arrival of these new malware families by COLDRIVER highlight the difficulties cybersecurity professionals continue to encounter around the world. Attackers, as exemplified by COLDRIVER, are increasingly skilled and dangerous. At the same time, they are aggressively sharpening their tactics to exploit vulnerabilities in digital infrastructures.
Cybersecurity analysts have consistently cautioned that as these threats develop, organizations need to take a proactive approach and strengthen their defenses. Malware such as LOSTKEYS and other ROBOT variants are advancing at a rapid pace. As compelling as these opportunities are, this rapid development demands a holistic approach to threat detection and response.


