Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TikTok robot star Rizzbot gave me the middle finger

India, where BlaBlaCar once exited, is now its largest market.

Obvious security risks of AI browser agents

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google identifies three new Russian malware families created by COLDRIVER hackers
Identity

Google identifies three new Russian malware families created by COLDRIVER hackers

userBy userOctober 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 21, 2025Ravi LakshmananCyber ​​espionage/threat intelligence

The new malware, attributed to a Russia-linked hacker group known as COLDRIVER, has been in development multiple times since May 2025, suggesting an increase in the “tempo of operations” by the threat actors.

The findings come from the Google Threat Intelligence Group (GTIG), which states that in the same period, just five days after the LOSTKEYS malware was released, state-sponsored hacking groups rapidly refined and rebuilt their malware arsenal.

It is currently unclear how long the new malware family has been in development, but the tech giant’s threat intelligence team said it has not observed a single instance of LOSTKEYS since its publication.

The new malware, codenamed NOROBOT, YESROBOT, and MAYBEROBOT, is “a collection of related malware families connected through a distribution chain,” GTIG researcher Wesley Shields said in an analysis Monday.

DFIR retainer service

The latest wave of attacks is a little different from COLDRIVER’s typical tactics, targeting NGOs, policy advisors, and prominent opposition figures to steal their credentials. In contrast, the new activity leverages ClickFix-style lures to trick users into Windows as part of a fake CAPTCHA verification prompt.[ファイル名を指定して実行]It revolved around executing malicious PowerShell commands via a dialog.

Attacks observed in January, March, and April 2025 led to the introduction of information-stealing malware known as LOSTKEYS, while subsequent intrusions paved the way for the “ROBOT” family of malware. It is worth noting that the malware families NOROBOT and MAYBEROBOT are tracked by Zscaler ThreatLabz under the names BAITSWITCH and SIMPLEFIX, respectively.

The new infection chain begins with an HTML ClickFix lure called COLDCOPY that is designed to drop a DLL called NOROBOT, which is executed via rundll32.exe and drops the next stage of malware. An earlier version of this attack allegedly distributed a Python backdoor known as YESROBOT before threat actors switched to a Powershell implant named MAYBEROBOT.

YESROBOT uses HTTPS to obtain commands from a hard-coded command and control (C2) server. It is a minimal backdoor that supports the ability to download and execute files to retrieve desired documents. To date, only two deployments of YESROBOT have been observed, specifically during a two-week period in late May, shortly after details of LOSTKEYS were made public.

In contrast, MAYBEROBOT is considered more flexible and extensible, with the ability to download and execute payloads from specified URLs, execute commands using cmd.exe, and execute PowerShell code.

COLDRIVER’s attackers are believed to have hastily deployed YESROBOT as a “stopgap mechanism” before abandoning YESROBOT in favor of MAYBEROBOT following public release. This is because the initial version of NOROBOT also included a step to download a complete Python 3.8 installation onto the compromised host. This “noisy” artifact is sure to arouse suspicion.

Google also noted that the use of NOROBOT and MAYBEROBOT is likely to be limited to high-value targets that may have already been compromised by phishing, with the ultimate goal of gathering additional information from the device.

“NOROBOT and its predecessor infection chains have been constantly evolving, first being simplified to increase the likelihood of successful deployment and then reintroducing complexity by splitting the cryptographic keys,” Shields said. “This continued development highlights the group’s efforts to evade detection systems and delivery mechanisms for continuous intelligence collection against high-value targets.”

CIS build kit

The revelations came after the Dutch public prosecutor’s office, known as Minister Openvaal (OM), announced that three 17-year-old men are suspected of providing services to foreign governments, and one of them is suspected of being in contact with a hacker group affiliated with the Russian government.

“The suspect also instructed two other people to map Wi-Fi networks on multiple dates in The Hague,” the OM said. “The information collected may be shared by former suspects with clients for a fee and used for digital espionage or cyberattacks.”

Two of the suspects were arrested on September 22, 2025, and the third suspect was also interviewed by authorities, but is currently under house arrest due to his “limited role” in the case.

The Dutch government agency added: “There is no evidence yet that any pressure was applied to the suspects who were in contact with Russian state hacker groups.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHackers use Snappybee malware and Citrix vulnerability to infiltrate European telecom networks
Next Article Amazon identifies problem that destroyed much of the internet, says AWS is back to normal
user
  • Website

Related Posts

Smishing Triad links to 194,000 malicious domains in global phishing operation

October 24, 2025

Critical, newly patched Microsoft WSUS flaw exploited

October 24, 2025

APT36 targets Indian government with Golang-based DeskRAT malware campaign

October 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TikTok robot star Rizzbot gave me the middle finger

India, where BlaBlaCar once exited, is now its largest market.

Obvious security risks of AI browser agents

This week in science news: Comets light up the sky and hurtle toward the sun, our galaxy’s mysterious glow is explained, and scientists say why time moves faster as we get older

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.