Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Date, time, and what to anticipate

November 12, 2025

Extra Northern Lights anticipated after 2025’s strongest photo voltaic flare

November 12, 2025

Apple’s iPhone 18 lineup might get a big overhaul- Particulars

November 12, 2025
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Date, time, and what to anticipate
  • Extra Northern Lights anticipated after 2025’s strongest photo voltaic flare
  • Apple’s iPhone 18 lineup might get a big overhaul- Particulars
  • MTN, Airtel dominate Nigeria’s ₦7.67 trillion telecom market in 2024
  • Leakers declare subsequent Professional iPhone will lose two-tone design
  • Methods to Cut back Price and Latency of Your RAG Software Utilizing Semantic LLM Caching
  • Vivo X300 Collection launch in India confirmed: Anticipated specs, options, and worth
  • Cassava launches AI multi-model trade for cellular operators
Wednesday, November 12
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - Hackers Weaponize Home windows Hyper-V to Conceal Linux VM and Evade EDR Detection
Cybersecurity & Digital Rights

Hackers Weaponize Home windows Hyper-V to Conceal Linux VM and Evade EDR Detection

NextTechBy NextTechNovember 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
Hackers Weaponize Home windows Hyper-V to Conceal Linux VM and Evade EDR Detection
Share
Facebook Twitter LinkedIn Pinterest Email


Nov 06, 2025Ravie LakshmananMalware / Community Safety

The risk actor often called Curly COMrades has been noticed exploiting virtualization applied sciences as a solution to bypass safety options and execute customized malware.

Based on a brand new report from Bitdefender, the adversary is alleged to have enabled the Hyper-V position on chosen sufferer techniques to deploy a minimalistic, Alpine Linux-based digital machine.

“This hidden setting, with its light-weight footprint (solely 120MB disk house and 256MB reminiscence), hosted their customized reverse shell, CurlyShell, and a reverse proxy, CurlCat,” safety researcher Victor Vrabie, together with Adrian Schipor and Martin Zugec, mentioned in a technical report.

DFIR Retainer Services

Curly COMrades was first documented by the Romanian cybersecurity vendor in August 2025 in reference to a collection of assaults concentrating on Georgia and Moldova. The exercise cluster is assessed to be energetic since late 2023, working with pursuits which might be aligned with Russia.

These assaults had been discovered to deploy instruments like CurlCat for bidirectional information switch, RuRat for persistent distant entry, Mimikatz for credential harvesting, and a modular .NET implant dubbed MucorAgent, with early iterations courting again all the best way to November 2023.

In a follow-up evaluation carried out in collaboration with Georgia CERT, further tooling related to the risk actor has been recognized, alongside makes an attempt to determine long-term entry by weaponizing Hyper-V on compromised Home windows 10 hosts to arrange a hidden distant working setting.

apline

“By isolating the malware and its execution setting inside a VM, the attackers successfully bypassed many conventional host-based EDR detections,” the researchers mentioned. “The risk actor demonstrated a transparent willpower to take care of a reverse proxy functionality, repeatedly introducing new tooling into the setting.”

Moreover utilizing Resocks, Rsockstun, Ligolo-ng, CCProxy, Stunnel, and SSH-based strategies for proxy and tunneling, Curly COMrades has employed varied different instruments, together with a PowerShell script designed for distant command execution and CurlyShell, a beforehand undocumented ELF binary deployed within the digital machine that gives a persistent reverse shell.

CIS Build Kits

Written in C++, the malware is executed as a headless background daemon to hook up with a command-and-control (C2) server and launch a reverse shell, permitting the risk actors to run encrypted instructions. Communication is achieved by way of HTTP GET requests to ballot the server for brand spanking new instructions and utilizing HTTP POST requests to transmit the outcomes of the command execution again to the server.

“Two customized malware households – CurlyShell and CurlCat – had been on the heart of this exercise, sharing a largely similar code base however diverging in how they dealt with acquired information: CurlyShell executed instructions instantly, whereas CurlCat funneled site visitors by SSH,” Bitdefender mentioned. “These instruments had been deployed and operated to make sure versatile management and adaptableness.”

Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the newest breakthroughs, get unique updates, and join with a world community of future-focused thinkers.
Unlock tomorrow’s tendencies at present: learn extra, subscribe to our e-newsletter, and turn out to be a part of the NextTech neighborhood at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

How Uber appears to know the place you’re – even with restricted location permissions

November 12, 2025

Why software program patching issues greater than ever

November 11, 2025

Hackers Exploiting Triofox Flaw to Set up Distant Entry Instruments by way of Antivirus Characteristic

November 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Economy News

Date, time, and what to anticipate

By NextTechNovember 12, 2025

The OnePlus 15 is coming sooner than anybody anticipated. In contrast to earlier fashions that…

Extra Northern Lights anticipated after 2025’s strongest photo voltaic flare

November 12, 2025

Apple’s iPhone 18 lineup might get a big overhaul- Particulars

November 12, 2025
Top Trending

Date, time, and what to anticipate

By NextTechNovember 12, 2025

The OnePlus 15 is coming sooner than anybody anticipated. In contrast to…

Extra Northern Lights anticipated after 2025’s strongest photo voltaic flare

By NextTechNovember 12, 2025

Social media websites are rife with photographs of the night time sky…

Apple’s iPhone 18 lineup might get a big overhaul- Particulars

By NextTechNovember 12, 2025

Apple has reportedly shifted its focus in the direction of the next-generation…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!