COLDRIVER Hackers Unveil New Malware Variants Amidst Rising Cyber Threats

A Russia-linked hacking group, the COLDRIVER group, has been in the news recently. They’ve doubled down with the release of new malware families, a clear sign of the extensive escalation of their cyber warfare efforts. Since May 2025, COLDRIVER’s malware has undergone numerous developmental iterations and exhibited an increased “operations tempo,” drawing attention from cybersecurity…

Tina Reynolds Avatar

By

COLDRIVER Hackers Unveil New Malware Variants Amidst Rising Cyber Threats

A Russia-linked hacking group, the COLDRIVER group, has been in the news recently. They’ve doubled down with the release of new malware families, a clear sign of the extensive escalation of their cyber warfare efforts. Since May 2025, COLDRIVER’s malware has undergone numerous developmental iterations and exhibited an increased “operations tempo,” drawing attention from cybersecurity experts globally.

This is particularly concerning, as the group exclusively—or almost exclusively—targets high-profile individuals such as NGO workers, policy advisors, and political dissidents to hijack credentials. Now, it looks like they’ve switched strategies. The most recent wave of attacks has departed from that playbook. This change is deeply troubling, and its global impact on cybersecurity cannot be overstated.

Evolution of Malware Families

COLDRIVER has been linked to the deployment of an information-stealing malware known as LOSTKEYS. This malware was in the wild during January, March, and April of 2025. Since these attacks, the group has released additional malware, including a new malware family, ROBOT, into its attack arsenal. Recent reports indicate that COLDRIVER has unleashed a variant called YESROBOT. It was only witnessed in two cases over a two-week period in late May 2025.

YESROBOT had the great fortune of being born immediately after the public release of LOSTKEYS. This timing signals a further strategic evolution in COLDRIVER’s malware development. Specialists further emphasize that the group’s malware families are linked via a delivery chain. This revelation makes clear the complexity and orchestration fueling their operation.

“NOROBOT and its preceding infection chain have been subject to constant evolution — initially simplified to increase chances of successful deployment, before re-introducing complexity by splitting cryptography keys,” – Wesley Shields.

Additionally, COLDRIVER’s malware families NOROBOT and MAYBEROBOT are tracked under the aliases BAITSWITCH and SIMPLEFIX by Zscaler ThreatLabz. This continuous evolution demonstrates a deep, systemic approach to addressing emerging cyber threats. This targets specific individuals and arguably includes larger sophisticated regular government digital espionage efforts.

Recent Apprehensions Linked to Cyber Activities

Three 17-year-old males were arrested and are suspected of providing services to an international terrorist organization. Of these people, one is said to have established communications with COLDRIVER. These culprits were brought to justice thanks to the Netherlands’ Public Prosecution Service, or Openbaar Ministerie (OM).

Police arrested two men in connection with the murder on September 22, 2025. The third suspect was put under house arrest due to his lesser involvement. According to the OM, the suspect had instructed the other two to locate Wi-Fi networks. As it would turn out, this became a frequent occurrence in The Hague.

“This suspect also gave the other two instructions to map Wi-Fi networks on multiple dates in The Hague,” – OM.

Even more alarming is the revelation that all the data collected from these invasive practices had been sold to corporate clients. This practice would allow for digital espionage and cyber warfare.

“The information collected has been shared with the client by the former suspect for a fee and can be used for digital espionage and cyber attacks,” – OM.

Implications for Global Cybersecurity

The conduct of COLDRIVER and this week’s recent arrests further underscore the disturbing trend in Russia-based cyber threats. Malware is changing every day and getting smarter right before our eyes. This burglarious trend is deeply troubling to cybersecurity professionals and government attachés alike.

As these hackers evolve and hone their game, the risk for larger and more devastating breaches grows. A Dutch government body stated that there are currently “no indications yet that pressure has been exerted on the suspect who was in contact with the hacker group affiliated with the Russian government.”

“There are no indications yet that pressure has been exerted on the suspect who was in contact with the hacker group affiliated with the Russian government,” – Dutch government body.

These developments affect national security beyond the military-industrial complex. They call attention to the continued need for enhanced caution and better cybersecurity practices around the world.