Increased Threat from Russian Hacking Group COLDRIVER as New Malware Families Emerge

COLDRIVER, a hacking group said to be affiliated with Russia, has been making headlines. They’ve recently escalated their cyber agenda, particularly at the expense of high-profile targets. This cohort usually only targets NGOs, policy advisors, and dissidents, mostly for credential harvesting. This corroboration comes as recent developments indicate COLDRIVER has deployed additional malware families. Their…

Tina Reynolds Avatar

By

Increased Threat from Russian Hacking Group COLDRIVER as New Malware Families Emerge

COLDRIVER, a hacking group said to be affiliated with Russia, has been making headlines. They’ve recently escalated their cyber agenda, particularly at the expense of high-profile targets. This cohort usually only targets NGOs, policy advisors, and dissidents, mostly for credential harvesting. This corroboration comes as recent developments indicate COLDRIVER has deployed additional malware families. Their strategic and tactical evolution represents a dramatic change since May 2025.

COLDRIVER malware development has progressed through several phases. Zscaler ThreatLabz tracks it as BAITSWITCH and SIMPLEFIX, among other identifiers. The latest attacks represent a significant departure from COLDRIVER’s usual modus operandi, raising concerns among cybersecurity experts regarding the group’s evolving capabilities.

Recent Developments in Malware Tactics

COLDRIVER’s recent attack waves have got the cybersecurity community on high alert. Previously only interested in credential theft, the group has since expanded its interests. The most prominent case of this trend so far is an information stealing malware called LOSTKEYS. Cybersecurity specialists first discovered this risk during the assault in January, March, and April 2025.

By late May 2025, the story of LOSTKEYS was common knowledge. Shortly thereafter, we saw only the second case ever of another malware variant known as YESROBOT. This indicates that COLDRIVER is pushing the limits of techniques, but at its heart, still focused on the primary objective of information theft.

“NOROBOT and its preceding infection chain have been subject to constant evolution — initially simplified to increase chances of successful deployment, before re-introducing complexity by splitting cryptography keys.” – Wesley Shields

The rise of the “ROBOT” family of malware only underscores COLDRIVER’s accelerating operational tempo. Our continued real-time monitoring at Zscaler ThreatLabz shows that this group is able to quickly pivot to adjust to countermeasures in the evolving cybersecurity landscape.

Investigations into Suspected Collaborators

The Netherlands’ Public Prosecution Service, or Openbaar Ministerie (OM), has taken to the pursuit. Some of their ongoing investigations include three 17-year-old males who allegedly provided diesel mechanic services to an enemy government. One remained in communication with COLDRIVER and is further alleged to have been among the initial suspects. LaRue on September 22, 2025, but hadn’t yet made an arrest. The other suspect, the third one, is now on house arrest due to his minimal complicity in the case.

“This suspect also gave the other two instructions to map Wi-Fi networks on multiple dates in The Hague.” – Openbaar Ministerie (OM)

Authorities stress that these suspects didn’t just collect this information — they sold it directly to customers. This vast trove of data would be a boon for digital espionage and cyber attacks. What makes this case unique is the local connection between these individual locals and a Russian foreign hacking entity, highlighting the evolving environment of cybersecurity threats.

“There are no indications yet that pressure has been exerted on the suspect who was in contact with the hacker group affiliated with the Russian government.” – Dutch government body

Implications for Cybersecurity

COLDRIVER’s recent activity underscores some serious implications for international cybersecurity efforts. As these hacking groups develop new tactics and techniques, organizations need to develop a more proactive approach. The emergence of new malware families and participation from local suspects point to a growing sophistication in cyber threats.

Wesley Shields of COLDRIVER breaks down their malware as “a complex ecosystem of interoperable malware families linked through a distributed delivery matrix. This stark interconnectedness highlights pressing questions—How can cybersecurity defenses be better hardened against evolving, hybrid threats like this?