As you can see, our cybersecurity landscape is under incredible duress. The Russia-linked hacking group COLDRIVER has introduced a new malware family. Coming after many iterations since the second development in May 2025, this development marks a higher operational tempo from the group. Historically, COLDRIVER has focused on credential theft from high-profile users, including NGO staffers, policy advisors, and dissidents. The most recent wave of attacks represents a break from their typical modus operandi.
In January, March, and April 2025, COLDRIVER deployed an information-stealing malware known as LOSTKEYS. These new intrusions have led to the creation of a new malware family known as “ROBOT.” This clade consists of the variants YESROBOT, NOROBOT, and MAYBEROBOT, among others. Cybersecurity researchers are taking a keen interest in these developments as they represent an increasingly dangerous threat landscape for targeted individuals and organizations.
Increased Operations Tempo
The development of COLDRIVER’s malware represents a new speediness to the – notably heightening – hacking debuts. Since May 2025, the criminal group has released several iterations of their malware. This modification reflects a fundamental transformation in to more hawkish and complex cyber campaigns.
Wesley Shields, a cybersecurity expert, emphasized the significance of this evolution:
“NOROBOT and its preceding infection chain have been subject to constant evolution — initially simplified to increase chances of successful deployment, before re-introducing complexity by splitting cryptography keys.”
This adaptive approach is a sign that COLDRIVER is constantly evolving its methods to get around new and improved security features.
COLDRIVER’s recent attacks have put them high on the watchlist of many cybersecurity firms, including those like Zscaler ThreatLabz which are now diligently tracking the group. They now track the group’s malware families as ROBOT, BAITSWITCH, and SIMPLEFIX. The growing wave of attacks has caused concern in the cybersecurity community.
Investigation and Arrests
In a positive turn of events, the Netherlands’ Public Prosecution Service (OM) has faced its own investigation. Specifically, they are targeting people suspected of providing intelligence services to foreign governments. Three of the suspects are 17-year-old men. One of them, according to the Department of Justice, has been in communication with a hacker group linked to the Russian state security apparatus.
On September 22, 2025, Dutch authorities arrested two of the suspects. At the same time, they put the third suspect under house arrest. The OM has stated that:
“The information collected has been shared with the client by the former suspect for a fee and can be used for digital espionage and cyber attacks.”
This case, unfortunately, draws attention to a serious and chronic problem of Americans working with foreign cybercriminals. The OM further noted that:
“This suspect also gave the other two instructions to map Wi-Fi networks on multiple dates in The Hague.”
For the time being, authorities have told us that there are no indications of coercion with the suspect tied to COLDRIVER.
Implications for Cybersecurity
COLDRIVER’s actions have implications beyond their specific targets. They are an incredible national security threat and threat to our entire digital infrastructure. The group’s focus on high-profile individuals suggests a strategy aimed at gathering sensitive information that could be exploited for political or financial gain.
Cybersecurity officials across the federal government are urging Americans to be on guard against these sorts of threats. Organizations need to be continuously vigilant of the tactics, techniques, and procedures that hacking groups such as COLDRIVER are using. Implementing comprehensive security protocols and creating a culture of vigilance among staff can combat threats from credential harvesting and industrial information espionage.
Preparing for a new season, COLDRIVER is changing tactics and increasing the volume of its strikes. That is why it is important that the public and private sector collaborate in order to improve our collective cyber defenses. Regularly tracking and reporting on this kind of hacking will be crucial in fighting this growing wave of cybercrime.

