COLDRIVER (also tracked as Star Blizzard, UNC4057, and Callisto), a Russian state-sponsored threat actor, has shown significant resilience and agility by rapidly retooling its operations following public disclosure. According to Google's Threat Intelligence Group (GTIG), just five days after its LOSTKEYS malware was detailed in a public report in May 2025, the group deployed a new malicious DLL named NOROBOT. This new tool was used to deliver a flexible PowerShell-based backdoor, MAYBEROBOT, in campaigns targeting high-value individuals relevant to Russian state interests, including NGOs, policy advisors, and dissidents. This rapid pivot demonstrates the group's ability to quickly adapt its toolset to evade detection and sustain its intelligence collection objectives.
The campaign highlights COLDRIVER's operational tempo and iterative development process. After the public exposure of LOSTKEYS, the group immediately shifted to a new toolchain. The initial vector involved a "ClickFix" lure, a fake CAPTCHA that tricks the target into executing the malicious NOROBOT DLL. Early versions of NOROBOT (also independently named BAITSWITCH by Zscaler) were used to download a Python-based backdoor called YESROBOT. However, the group quickly abandoned this for the more versatile MAYBEROBOT PowerShell backdoor. Throughout the summer of 2025 (June-September), COLDRIVER continued to release multiple variants of NOROBOT, constantly modifying it to avoid detection by security products while continuing its espionage campaigns.
COLDRIVER's updated attack chain reflects a focus on evading signature-based detection:
T1566.002 - Spearphishing Link. The campaign relies on tricking users into clicking links that lead to the "ClickFix" lure, which initiates the malware execution.T1204.002 - Malicious File. The user is manipulated into running the malicious payload disguised as a CAPTCHA solver.T1059.001 - PowerShell. The ultimate payload, MAYBEROBOT, is a PowerShell backdoor. Using PowerShell allows for fileless execution and makes it easier to blend in with legitimate administrative activity.T1027 - Obfuscated Files or Information). By constantly changing the malware's signatures, the group aims to stay ahead of antivirus and EDR detections.T1105 - Ingress Tool Transfer. The NOROBOT DLL's primary function is to download the next-stage payload (MAYBEROBOT) from a hardcoded C2 address.The primary goal of COLDRIVER is intelligence collection. By targeting NGOs, policy advisors, and dissidents, the Russian government gains insight into policy-making, political opposition, and other areas of strategic interest. The compromise of these individuals' devices provides the attackers with access to sensitive communications, documents, and contact lists. The group's demonstrated ability to rapidly retool after public disclosure means they are a persistent and resilient threat, capable of maintaining access to targets even after their methods are exposed.
Security teams should hunt for signs of COLDRIVER's new toolset:
| Type | Value | Description |
|---|---|---|
file_name |
NOROBOT.dll, BAITSWITCH.dll |
Hunt for the presence of these specific DLL files on disk. |
command_line_pattern |
powershell.exe -enc or powershell.exe -nop -w hidden |
Monitor for PowerShell execution with encoded commands or hidden windows, common indicators of malicious scripts. |
log_source |
PowerShell Script Block Logging (Event ID 4104) |
Enable and monitor PowerShell script block logging to capture the deobfuscated content of scripts like MAYBEROBOT. |
network_traffic_pattern |
Connections from powershell.exe to unknown IPs |
Monitor for network connections originating directly from PowerShell processes, especially to untrusted destinations. |
D3-PA: Process Analysis.D3-UA: URL Analysis.M1017 - User Training).D3-ACH: Application Configuration Hardening.Train high-risk users to identify and report sophisticated phishing lures like the 'ClickFix' CAPTCHA.
Use application control to restrict the execution of PowerShell and other scripting languages, preventing backdoors like MAYBEROBOT from running.
Mapped D3FEND Techniques:
Enable and collect detailed logs, especially PowerShell Script Block Logging, to provide visibility into malicious script execution.
Use web filtering and URL analysis to block access to malicious domains hosting lures and malware payloads.
Mapped D3FEND Techniques:
To specifically counter the MAYBEROBOT PowerShell backdoor, it is critical to enable and centralize PowerShell logging, particularly Script Block Logging (Event ID 4104). This provides the full, deobfuscated content of executed scripts. In your SIEM, create detection rules that hunt for suspicious functions, cmdlets, and strings commonly found in PowerShell backdoors (e.g., Invoke-Expression, IEX, base64 decoding, web requests). Furthermore, use an EDR to monitor process ancestry. An alert should be triggered if a common user application like a browser or PDF reader spawns a PowerShell process, as this is a key indicator of the COLDRIVER attack chain.
Harden PowerShell configurations across the enterprise, especially on workstations of high-value targets like policy advisors. Where full PowerShell functionality is not needed, use Group Policy to enable 'Constrained Language Mode'. This mode severely limits the capabilities of PowerShell, preventing access to sensitive .NET functions and cmdlets that backdoors like MAYBEROBOT rely on for their functionality. This acts as a preventative control that can neutralize the payload even if the initial lure is successful. This should be coupled with application control policies (like WDAC) to restrict PowerShell execution entirely for most users.
The initial vector for this attack is a malicious link leading to a lure. Implement an advanced email security and web filtering solution with time-of-click URL protection. This technology re-analyzes the destination URL every time a user clicks it, protecting against delayed weaponization. Given COLDRIVER's targeting of specific individuals, these solutions should be configured with heightened sensitivity for users in high-risk roles (NGOs, government advisors). The system should be able to identify and block newly registered domains or pages masquerading as legitimate services like CAPTCHA providers, disrupting the attack chain at the earliest stage.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats