Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Google Finds New Russian Malware

October 22, 2025
Reading Time: 3 mins read
in Alerts
PolarEdge Expands Router Botnet

A Russia-linked hacking group known as COLDRIVER is showing signs of a heightened operations tempo, according to Google Threat Intelligence Group (GTIG). Since May 2025, the state-sponsored actor has rapidly refined and retooled its malware toolkit. This swift development began merely five days after the public disclosure of its previous information-stealing malware, LOSTKEYS. GTIG’s observation of this accelerated development suggests a sustained effort by the group to maintain its capabilities. While it’s unknown how long the newest malware families have been under development, GTIG has not seen a single instance of LOSTKEYS in the wild since its details were published.

The new malware collection, codenamed NOROBOT, YESROBOT, and MAYBEROBOT, represents a set of related families linked via a delivery chain. This activity marks a departure from COLDRIVER’s standard operating procedure, which typically focused on credential theft from high-profile individuals in NGOs, policy advisors, and dissidents. The new attacks leverage “ClickFix-style lures” to trick users into running malicious PowerShell commands through the Windows Run dialog, often under the guise of a fake CAPTCHA verification prompt. The earlier attack waves in January, March, and April 2025 had deployed the LOSTKEYS information stealer, but subsequent intrusions have led to the deployment of this new “ROBOT” family of malware.

The infection chain begins with an HTML ClickFix lure, dubbed COLDCOPY, which drops a DLL called NOROBOT. This DLL is then executed to drop the next-stage malware. Initial versions of this sophisticated attack distributed a Python backdoor named YESROBOT. This minimal backdoor used HTTPS to retrieve commands and only supported basic functions like file download/execution and retrieving specific documents. However, after only two observed deployments, the threat actors quickly switched to a more flexible PowerShell implant called MAYBEROBOT, which has greater capabilities, including the ability to run arbitrary commands and download payloads from a URL.

It’s believed that the COLDRIVER actors rushed to deploy the simpler YESROBOT as a “stopgap mechanism” immediately following the LOSTKEYS disclosure. They soon abandoned it in favor of the more robust MAYBEROBOT. The earliest version of NOROBOT also included a step to download a full Python 3.8 installation, a “noisy” artifact that would easily raise suspicion, which further supports the theory of a rushed initial deployment followed by rapid refinement. Google posits that the use of NOROBOT and MAYBEROBOT is likely reserved for the group’s most significant targets, who may have already been compromised via phishing, for the end goal of gathering additional intelligence from their devices.

This constant evolution—where the malware was initially simplified and later re-complicated by splitting cryptography keys—highlights the group’s concerted effort to evade detection systems for their delivery mechanism. The goal remains consistent: continued intelligence collection against high-value targets. This disclosure comes as the Netherlands’ Public Prosecution Service (OM) announced that three 17-year-old men are suspected of providing services to a foreign government. One of the suspects is alleged to have been in contact with a hacker group affiliated with the Russian government and gave instructions to the others to map Wi-Fi networks in The Hague. The information collected was shared with the client for a fee, and the OM believes it could be used for digital espionage and cyber attacks.

Reference:

  • Google Identifies Three New Russian Malware Families Created By Coldriver Hackers
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

PolarEdge Expands Router Botnet

PolarEdge Expands Router Botnet

October 22, 2025
PolarEdge Expands Router Botnet

Copilot Flaw Exposes Sensitive Data

October 22, 2025
WatchGuard Devices At Risk Of RCE

BitLocker May Lock Your Data Silently

October 21, 2025
WatchGuard Devices At Risk Of RCE

North Korea Hackers Use New JS Malware

October 21, 2025
WatchGuard Devices At Risk Of RCE

WatchGuard Devices At Risk Of RCE

October 21, 2025
Experian Fined For Data Collection

TikTok Videos Driving Infostealer Attacks

October 20, 2025

Latest Alerts

Copilot Flaw Exposes Sensitive Data

PolarEdge Expands Router Botnet

Google Finds New Russian Malware

BitLocker May Lock Your Data Silently

North Korea Hackers Use New JS Malware

WatchGuard Devices At Risk Of RCE

Subscribe to our newsletter

    Latest Incidents

    Union Cyberattack Raises Concerns

    Romanian Prisoner Hacks Prison IT

    Hackers Claim Data On NSA Officials

    Muji Stops Online Sales After Attack

    Major Telco Confirms Cyber Breach

    Russian Hackers Leak UK MoD Files

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial