The findings of the latest investigation were particularly troubling. It also touted the discovery of a Russia-linked hacking group’s (COLDRIVER collective’s) naming three new malware families. The malware, which has been in continuous development since May 2025, demonstrates a marked advancement in tactics and capabilities. The Openbaar Ministerie, the Netherlands’ Public Prosecution Service, has announced those findings. They provide important information about the scale, pace, and complexity of these cyber issues.
The COLDRIVER malware is indeed known as being part of the “ROBOT” family, which has become infamous in the cybersecurity world. Zscaler ThreatLabz has spotted two major malware families linked to COLDRIVER. They are BAITSWITCH, associated with NOROBOT, and SIMPLEFIX, associated with MAYBEROBOT. This constant development of these malware variants shows the growing threat level it represents to our digital infrastructures.
Analysis of COLDRIVER Development
Since its release, the COLDRIVER malware has undergone several developmental phases. We see this evolution having a very personal aspect, a function of the creators’ growing operational imperative. This development was underscored by the Openbaar Ministerie as they reported on the malware’s increase and developments. The report argues that these changes have combined to allow the malware to deploy more successfully within targeted systems.
Cybersecurity expert Wesley Shields explained some of the history and development of NOROBOT. He stated, “NOROBOT and its preceding infection chain have been subject to constant evolution – initially simplified to increase chances of successful deployment, before re-introducing complexity by splitting cryptography keys.” This change signals a clear desire by the bad guys to become more strategic in their operations to increase their impact.
Even more recently, a malware variant known as LOSTKEYS has sent up warning signals. It has been exploited in targeted attacks in January, March, and April 2025. Interestingly, the deployment of LOSTKEYS paved the way for later more egregious intrusions that eventually allowed introduction of the “ROBOT” family of malware. The coordination among these malware types shows a sophisticated cyber campaign focused on data theft and digital espionage.
Recent Arrests Linked to COLDRIVER Activities
The probe into COLDRIVER operations has led to major enforcement measures in the Netherlands. The Openbaar Ministerie further stated that three 17-year-old suspects are being prosecuted for suspected provision of services to a foreign state. Of those, one of the suspects apparently remained in touch with a hacker group supported by the Russian government.
On September 22, 2025, law enforcement arrested one of the suspects. The private security contractor in the third suspect’s position was placed under house arrest due to his “limited role” in the broader conspiracy. The prosecution service disclosed that this person had constantly been directing others to trace Wi-Fi networks throughout The Hague. They hosted educational opportunities to discuss all of this information repeatedly.
“This suspect also gave the other two instructions to map Wi-Fi networks on multiple dates in The Hague,” – Openbaar Ministerie (OM)
The arrested suspects are thought to have profited from their work by selling data gathered through their raids. This information could be used for a number of nefarious ends, ranging from digital espionage to cyber warfare.
“The information collected has been shared with the client by the former suspect for a fee and can be used for digital espionage and cyber attacks,” – Openbaar Ministerie (OM)
Implications for Cybersecurity
The revelations surrounding COLDRIVER and its associated malware families underscore a growing concern regarding cybersecurity threats emanating from state-sponsored actors. The Dutch government’s overt preemptive action in exposing these threats underscores the growing imperative to counter such malicious cyber operations.
As the threat landscape evolves, cybersecurity experts are still keeping close tabs on developments like COLDRIVER and its variants. This is just one example of the advanced complexity of malware such as NOROBOT and MAYBEROBOT. This unexpected growth presents significant dangers to our national security, private sector companies, and Americans overall.

