COLDRIVER Evolves with New ROBOT Malware Family Post-Exposure

Cyber Security News by CyberSum.net
8 sources
Google’s Threat Intelligence Group (GTIG) has uncovered a significant evolution in the operations of COLDRIVER, a state-sponsored threat actor. Within five days of the public disclosure of its LOSTKEYS malware in May 2025, COLDRIVER deployed a new malware ecosystem called the ROBOT family, including NOROBOT, YESROBOT, and MAYBEROBOT. The infection chain begins with a COLDCOPY ClickFix lure disguised as a CAPTCHA test. NOROBOT, the first-stage malware, retrieves payloads from a hardcoded command-and-control server. YESROBOT, a Python-based backdoor, was quickly replaced by MAYBEROBOT, a PowerShell-based backdoor offering greater operational flexibility. GTIG observed multiple NOROBOT variants, highlighting COLDRIVER’s efforts to evade detection while targeting high-value entities.