Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

AI is transferring quick. This undertaking goals to assist states sustain — responsibly.

November 12, 2025

A Safer, Smarter Approach to Palletize at Griffith Meals Colombia

November 12, 2025

The Inconceivable Black Holes That Should not Exist

November 12, 2025
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • AI is transferring quick. This undertaking goals to assist states sustain — responsibly.
  • A Safer, Smarter Approach to Palletize at Griffith Meals Colombia
  • The Inconceivable Black Holes That Should not Exist
  • Gemini for TV is coming to Google TV Streamer as of right now
  • Baidu Releases ERNIE-4.5-VL-28B-A3B-Considering: An Open-Supply and Compact Multimodal Reasoning Mannequin Beneath the ERNIE-4.5 Household
  • Immortality startup Eternos nabs $10.3M, pivots to non-public AI that sounds such as you
  • Chainlink Runtime Surroundings Now Reside, Unlocking the Full Capabilities of Onchain Finance
  • Ex-DeepSeek Core Developer Luo Fuli Joins Xiaomi to Lead MiMo Workforce on Spatial Intelligence
Wednesday, November 12
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - Hackers Weaponize Home windows Hyper-V to Conceal Linux VM and Evade EDR Detection
Cybersecurity & Digital Rights

Hackers Weaponize Home windows Hyper-V to Conceal Linux VM and Evade EDR Detection

NextTechBy NextTechNovember 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
Hackers Weaponize Home windows Hyper-V to Conceal Linux VM and Evade EDR Detection
Share
Facebook Twitter LinkedIn Pinterest Email


Nov 06, 2025Ravie LakshmananMalware / Community Safety

The risk actor often called Curly COMrades has been noticed exploiting virtualization applied sciences as a solution to bypass safety options and execute customized malware.

Based on a brand new report from Bitdefender, the adversary is alleged to have enabled the Hyper-V position on chosen sufferer techniques to deploy a minimalistic, Alpine Linux-based digital machine.

“This hidden setting, with its light-weight footprint (solely 120MB disk house and 256MB reminiscence), hosted their customized reverse shell, CurlyShell, and a reverse proxy, CurlCat,” safety researcher Victor Vrabie, together with Adrian Schipor and Martin Zugec, mentioned in a technical report.

DFIR Retainer Services

Curly COMrades was first documented by the Romanian cybersecurity vendor in August 2025 in reference to a collection of assaults concentrating on Georgia and Moldova. The exercise cluster is assessed to be energetic since late 2023, working with pursuits which might be aligned with Russia.

These assaults had been discovered to deploy instruments like CurlCat for bidirectional information switch, RuRat for persistent distant entry, Mimikatz for credential harvesting, and a modular .NET implant dubbed MucorAgent, with early iterations courting again all the best way to November 2023.

In a follow-up evaluation carried out in collaboration with Georgia CERT, further tooling related to the risk actor has been recognized, alongside makes an attempt to determine long-term entry by weaponizing Hyper-V on compromised Home windows 10 hosts to arrange a hidden distant working setting.

apline

“By isolating the malware and its execution setting inside a VM, the attackers successfully bypassed many conventional host-based EDR detections,” the researchers mentioned. “The risk actor demonstrated a transparent willpower to take care of a reverse proxy functionality, repeatedly introducing new tooling into the setting.”

Moreover utilizing Resocks, Rsockstun, Ligolo-ng, CCProxy, Stunnel, and SSH-based strategies for proxy and tunneling, Curly COMrades has employed varied different instruments, together with a PowerShell script designed for distant command execution and CurlyShell, a beforehand undocumented ELF binary deployed within the digital machine that gives a persistent reverse shell.

CIS Build Kits

Written in C++, the malware is executed as a headless background daemon to hook up with a command-and-control (C2) server and launch a reverse shell, permitting the risk actors to run encrypted instructions. Communication is achieved by way of HTTP GET requests to ballot the server for brand spanking new instructions and utilizing HTTP POST requests to transmit the outcomes of the command execution again to the server.

“Two customized malware households – CurlyShell and CurlCat – had been on the heart of this exercise, sharing a largely similar code base however diverging in how they dealt with acquired information: CurlyShell executed instructions instantly, whereas CurlCat funneled site visitors by SSH,” Bitdefender mentioned. “These instruments had been deployed and operated to make sure versatile management and adaptableness.”

Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the newest breakthroughs, get unique updates, and join with a world community of future-focused thinkers.
Unlock tomorrow’s tendencies at present: learn extra, subscribe to our e-newsletter, and turn out to be a part of the NextTech neighborhood at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

How Uber appears to know the place you’re – even with restricted location permissions

November 12, 2025

Why software program patching issues greater than ever

November 11, 2025

Hackers Exploiting Triofox Flaw to Set up Distant Entry Instruments by way of Antivirus Characteristic

November 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Economy News

AI is transferring quick. This undertaking goals to assist states sustain — responsibly.

By NextTechNovember 12, 2025

Hearken to the article 2 min This audio is auto-generated. Please tell us when you’ve…

A Safer, Smarter Approach to Palletize at Griffith Meals Colombia

November 12, 2025

The Inconceivable Black Holes That Should not Exist

November 12, 2025
Top Trending

AI is transferring quick. This undertaking goals to assist states sustain — responsibly.

By NextTechNovember 12, 2025

Hearken to the article 2 min This audio is auto-generated. Please tell…

A Safer, Smarter Approach to Palletize at Griffith Meals Colombia

By NextTechNovember 12, 2025

When each shift ends with sore backs and drained shoulders, it’s not…

The Inconceivable Black Holes That Should not Exist

By NextTechNovember 12, 2025

In 2023, gravitational wave detectors picked up the signature of a collision…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!