COLDRIVER Hacking Group Unveils New Malware Families Amid Increased Activity

A major breakthrough just took place in the world of cyber security. The Russia-linked hacking group COLDRIVER has been credited with the development of more than a dozen new malware families. This ramping up of operations seems to have started around May 2025, with the group allegedly stepping up their “operations tempo.” The well resourced…

Tina Reynolds Avatar

By

COLDRIVER Hacking Group Unveils New Malware Families Amid Increased Activity

A major breakthrough just took place in the world of cyber security. The Russia-linked hacking group COLDRIVER has been credited with the development of more than a dozen new malware families. This ramping up of operations seems to have started around May 2025, with the group allegedly stepping up their “operations tempo.” The well resourced group usually sets its sights on well-known leaders in the NGO sector and global policy advisors. They target dissidents, mostly to steal credentials.

COLDRIVER made its debut in early 2025 to much acclaim. It loaded an information-stealing malware dubbed LOSTKEYS on the attacks in January, March and April. Anatomy of a breach These first intrusions created the opportunity for the introduction of the “ROBOT” family of malware. This species has many variants, including YESROBOT, NOROBOT, and MAYBEROBOT. The continued deluge of attacks indicates a startling change in COLDRIVER’s tactics. They are now using a broader, more aggressive and diversified strategy with their cyber operations.

Recent Developments and Malware Families

The “ROBOT” family has already been covered extensively by cybersecurity professionals. NOROBOT and MAYBEROBOT have been tracked by Zscaler ThreatLabz under the aliases BAITSWITCH and SIMPLEFIX, respectively. Now we’ve had the opportunity to witness the fourth YESROBOT deployment. Invitation Both came about during an intense, two-week period in late May 2025.

Wesley Shields, our principal cybersecurity analyst and one of the architects of NOROBOT’s infection chain, remarked on the implications of this change. He stated, “NOROBOT and its preceding infection chain have been subject to constant evolution — initially simplified to increase chances of successful deployment, before re-introducing complexity by splitting cryptography keys.”

This increasing operational activity points to an exciting strategic shift in COLDRIVER’s focus. In the past, they’ve narrowed their sights on low-hanging credential theft tactics. Those most recent threats are part of a new sophisticated wave that can do more damage to organizations and individuals they specifically go after.

Arrests and Suspected Criminals

Today, the Openbaar Ministerie (OM), the Netherlands’ Public Prosecution Service, issued a groundbreaking statement. Specifically, they announced significant advancements in the case with three 17-year-old suspects connected to COLDRIVER. After the storm went through, on September 22, 2025, law enforcement officials arrested two of these individuals. They put the third one under house arrest given his “minor involvement” in the case.

Additionally, per the OM, one of the suspects claim to have communed with a hacker collective tied to the Government of Russia. “The information collected has been shared with the client by the former suspect for a fee and can be used for digital espionage and cyber attacks,” reported the OM.

Upon further examination, what we found was truly shocking. One suspect directed the other two to enumerate Wi-Fi networks in The Hague. This revelation is just the tip of the iceberg, showing what this young group is capable of.

Implications for Cybersecurity

Beyond the individual privacy concerns, the implications of COLDRIVER’s increased activity are much broader. To quote the grizzly bear above, cybersecurity experts are still picking through the group’s tactics and targets. Their results spur increasing concerns over the potential for larger scale digital espionage and cyber-attacks. The Dutch government body has stated that “there are no indications yet that pressure has been exerted on the suspect who was in contact with the hacker group affiliated with the Russian government,” which suggests ongoing investigations into potential foreign involvement.

The evolving nature of COLDRIVER’s malware and their strategic approach highlights an urgent need for enhanced cybersecurity measures among organizations exposed to such threats. Cybersecurity experts call for continual vigilance and proactive defense mechanisms to protect against the widespread risks posed by these advanced cyber operations.