Google Finds Three New Russian Malware Threats
Google identifies three new Russian malware families linked to the COLDRIVER hacking group. According to a recent threat report, the cyber group has intensified its operations since May 2025, rapidly evolving its malware arsenal to target high-profile individuals.
Researchers revealed that these malware variants named NOROBOT, YESROBOT, and MAYBEROBOT that form part of a connected delivery chain. The discovery shows how the group continues to refine its tools within days of earlier exposures.
Rapid Development and Tactics
Experts noted that COLDRIVER’s latest campaigns differ from their usual credential theft methods. Instead, the attackers now use ClickFix-style phishing lures that trick victims into running malicious PowerShell commands. These prompts appear as fake CAPTCHA verification messages to gain initial access.
Earlier this year, the same threat actors used a previous malware called LOSTKEYS. However, after that tool was publicly exposed, the hackers quickly replaced it with the new “ROBOT” malware family. This shows a clear attempt to adapt and maintain momentum after detection.
Technical Breakdown of the Malware
The infection begins with an HTML lure named COLDCOPY, which installs a file called NOROBOT. This file is executed through a Windows system process to drop the next malware stage.
The initial version delivered a Python-based backdoor known as YESROBOT, capable of downloading and executing commands from a remote server. However, only two YESROBOT incidents have been recorded before it was replaced by MAYBEROBOT, a more advanced PowerShell implant.
MAYBEROBOT is far more flexible. It can run commands, execute code, and download payloads from external links. Researchers believe COLDRIVER used YESROBOT only as a temporary solution before switching to the stronger and stealthier MAYBEROBOT.
Evolving Espionage Operations
Investigators observed that COLDRIVER continues to target high-value individuals, likely for espionage purposes. The malware’s evolution shows constant modification simplifying to ensure infection, then reintroducing encryption layers to avoid detection.
In a related case, Dutch authorities recently detained three teenagers suspected of assisting a foreign intelligence group. They allegedly mapped Wi-Fi networks for digital espionage operations.
How to Prevent Similar Threats
Organizations can reduce exposure to such malware by using endpoint protection and real-time phishing detection systems. Regular employee training and system patching are also essential.
Comprehensive monitoring solutions that detect abnormal PowerShell activity or unauthorized script execution can prevent early-stage infections and limit long-term damage.
Sleep well, we got you covered.

