A new research investigation recently discovered that the Russia-linked hacking group COLDRIVER is behind the development of entirely new malware families. Clockwork Carrots’ one of their coolest creations is a variant called YESROBOT. Cybersecurity researchers have recently observed COLDRIVER increasing its operations at an alarming rate. This exploration comes after the malware’s various developmental versions since May 2025. The implications of these findings are troubling given the increasing sophistication of cyber threats coming from this actor.
In late May 2025, level-setting malware YESROBOT was released across a two-week timeframe. This deployment was just a week after the public was first told about another malware called LOSTKEYS. LOSTKEYS, a recent — and very sophisticated — information-stealing malware, had been linked to some of those attacks earlier this year, in January, March, and April. COOLROADS has timed these deployments to maximum effect. They seek to build on the vulnerabilities exposed by their past work.
Increased Operations Tempo
Cybersecurity analysts have recently observed that the iterative but rapid pace of YESROBOT belies a marked increase in COLDRIVER’s operations tempo. This uptick aligns with the group’s broader strategy to enhance their malware’s effectiveness and reduce detection risks. Their malware is always one step ahead, due to the competitive advantage it affords them. This evolution allows them to prosper in the ever-growing, more complex world of cyber warfare.
Wesley Shields, another cybersecurity expert, wrote about the evolution of NOROBOT, another variant that emerged from COLDRIVER’s malware family. He stated, “NOROBOT and its preceding infection chain have been subject to constant evolution — initially simplified to increase chances of successful deployment, before re-introducing complexity by splitting cryptography keys.” This flexibility only underscores the creativity of the community of practice to further develop their methodologies for persistent intelligence collection against high value targets.
NOROBOT and its subsequent malware variants, such as BAITSWITCH and SIMPLEFIX, exemplify the concerted effort of COLDRIVER. This is because they are specifically designed to outsmart cybersecurity defenses and evade detection. Shields emphasized the importance of this evolution for the group’s objectives: “This constant development highlights the group’s efforts to evade detection systems for their delivery mechanism for continued intelligence collection against high-value targets.”
Suspects Apprehended
Dutch authorities said they had arrested three 17-year-old males. They are alleged to have provided services to a foreign adversary that we assess conducts cyber espionage. The first arrests came on September 22, 2025, which authorities quickly followed with a second arrest. They arrested the two main suspects while a third is currently under house arrest. The Public Prosecution Service hailed these developments as a significant step forward in an ongoing investigation looking into possible cybersecurity threats.
One of the suspects is said to have had direct communication with a hacker group linked to the Russian state. According to statements from the Dutch government body, “There are no indications yet that pressure has been exerted on the suspect who was in contact with the hacker group affiliated with the Russian government.” This particular point leads to a more important question of how far the cooperation goes between individuals and highly sophisticated cybercrime syndicates.
In this case, the suspect purposely directed the other two conspirators. Their Wi-Fi mapping sessions had participants map networks together several times around The Hague. The Openbaar Ministerie (OM) indicated that “The information collected has been shared with the client by the former suspect for a fee and can be used for digital espionage and cyber attacks.” These actions highlight both the growing dangers of those operating in coordination with well known hacker collectives.
Implications for Cybersecurity
The revelations regarding COLDRIVER’s activities and the apprehension of suspects linked to cyber espionage serve as a stark reminder of the evolving landscape of digital security threats. As malware families such as YESROBOT continue to multiply and grow in complexity, it’s imperative that organizations remain one step ahead in their cybersecurity efforts.
The increasing capabilities demonstrated by COLDRIVER point to a need for enhanced detection systems and proactive threat intelligence sharing among nations. As cybersecurity experts, we’re keeping a close eye on these developments. Only by the public and private sectors working together can we begin to fight against new, unpredictable dangers that are inherent in our digital age.

