COLDRIVER Hackers Evolve with New Malware Threats Linked to Russian Government

A recent analysis by cybersecurity experts has identified a notable evolution in the tactics of the Russia-linked hacking group known as COLDRIVER. This group has drawn international attention for their daring and creative operations that have targeted high-profile individuals connected to NGOs, policy advisors and dissidents. Their aim is to capture credentials from these powerful…

Tina Reynolds Avatar

By

COLDRIVER Hackers Evolve with New Malware Threats Linked to Russian Government

A recent analysis by cybersecurity experts has identified a notable evolution in the tactics of the Russia-linked hacking group known as COLDRIVER. This group has drawn international attention for their daring and creative operations that have targeted high-profile individuals connected to NGOs, policy advisors and dissidents. Their aim is to capture credentials from these powerful individuals. The new wave, from January to April 2025, is a substantial shift from COLDRIVER’s previous tactics.

The attacks led to the deployment of a new information-stealing malware called LOSTKEYS. After this, successful intrusions uncovered a total of 80 greater malware families, including ROBOT. This progress demonstrates a rapid increase in the operational speed of COLDRIVER. Since May 2025, we’ve observed dozens of iterations of their malware in the wild.

New Malware Families Emerge

COLDRIVER’s recent activity has sent a chill through the cybersecurity community. Zscaler ThreatLabz, one of the industry’s leading cybersecurity research teams, has been monitoring the new malware families linked to this group. More rigorously, they’ve isolated NOROBOT and MAYBEROBOT, known internally as BAITSWITCH and SIMPLEFIX, respectively.

The evolution of COLDRIVER’s malware is noteworthy as it showcases the group’s ability to adapt and innovate. The arrival of LOSTKEYS is an indication that cybercriminals are taking a more advanced approach to information-stealing tactics. This pattern is a hallmark of cyber threats. Adversaries are always changing their techniques to slip under the radar and enhance their potency.

Beyond LOSTKEYS, the recently discovered ROBOT malware family poses a much larger and immediate threat to possible victims. COLDRIVER is just getting started with its operations. The quick evolution and quick implementation of new threats shows us that their focus is changing, targeting a wide range of new targets.

Arrests Linked to COLDRIVER Activities

In a related development, the Netherlands’ Public Prosecution Service, known as the Openbaar Ministerie (OM), has announced significant progress in their investigation into COLDRIVER’s activities. Authorities have named three 17-year-old males suspects in his beating. They further claimed to have rendered services to a foreign government related to this hacking collective.

At least one of the suspects continued to communicate with a hacker group associated with the Russian government. This deeply troubling connection points to a much larger problem with national security and growing cyber espionage. Law enforcement agents arrested two of the suspects on September 22, 2025. The third suspect is under house arrest while officials deem their role in the case to be minor.

Young people are becoming engaged in more advanced cyber warfare operations. This trend demonstrates some nefarious recruitment practices employed by hacker groups. Hackers are coming after kids now more than ever. These young men and women are some of the most easily influenced, manipulated, and coerced individuals into engaging in illegal acts.

Implications for Cybersecurity

Each new malware family tied to COLDRIVER has important consequences on organizations and private citizens both, so I encourage everyone to have a look. The more the coalition scales and changes its approach, the more critical it becomes for stakeholders to level up their cybersecurity practices to avoid unintended consequences. The targeting of high-profile individuals suggests that those in sensitive positions should remain vigilant against potential phishing attempts and unauthorized access to their credentials.

Cybersecurity experts recommend that organizations implement robust security protocols, including multi-factor authentication and regular software updates, to defend against such sophisticated threats. Further, raising awareness and providing more training to employees about cybersecurity best practices can make it less likely that an attack will succeed.