Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

Posted on October 30, 2025October 30, 2025 By CWS

Oct 30, 2025Ravie LakshmananMalware / Cybercrime
The open-source command-and-control (C2) framework often known as AdaptixC2 is being utilized by a rising variety of menace actors, a few of whom are associated to Russian ransomware gangs.
AdaptixC2 is an rising extensible post-exploitation and adversarial emulation framework designed for penetration testing. Whereas the server part is written in Golang, the GUI Shopper is written in C++ QT for cross-platform compatibility.
It comes with a variety of options, together with totally encrypted communications, command execution, credential and screenshot managers, and a distant terminal, amongst others. An early iteration was publicly launched by a GitHub person named “RalfHacker” (@HackerRalf on X) in August 2024, who describes themselves as a penetration tester, purple workforce operator, and “MalDev” (quick for malware developer).

In latest months, AdaptixC2 has been adopted by numerous hacking teams, together with menace actors tied to the Fog and Akira ransomware operations, in addition to by an preliminary entry dealer that has leveraged CountLoader in assaults which might be designed to ship numerous post-exploitation instruments.
Palo Alto Networks Unit 42, which broke down the technical points of the framework final month, characterised it as a modular and versatile framework that can be utilized to “comprehensively management impacted machines,” and that it has been put to make use of as a part of pretend assist desk assist name scams by way of Microsoft Groups and thru a man-made intelligence (AI)-generated PowerShell script.
Whereas AdaptixC2 is obtainable as an moral, open-source device for purple teaming actions, it is also clear that it has attracted the eye of cybercriminals.
Cybersecurity firm Silent Push stated RalfHacker’s GitHub bio about them being a “MalDev” triggered an investigation, permitting them to seek out a number of e-mail addresses for GitHub accounts linked to the account’s proprietor, along with a Telegram channel known as RalfHackerChannel, the place they re-shared messages posted on a devoted channel for AdaptixC2. The RalfHackerChannel channel has greater than 28,000 subscribers.

In a message on the AdaptixFramework channel in August 2024, they talked about their curiosity in beginning a undertaking a few “public C2, which could be very stylish proper now” and hoped “will probably be like Empire,” one other common post-exploitation and adversary emulation framework.
Whereas it is presently not identified if RalfHacker has any direct involvement in malicious exercise tied to AdaptixC2 or CountLoader at this stage, Silent Push stated their “ties to Russia’s legal underground, by way of using Telegram for advertising and marketing and the device’s subsequent uptick in utilization by Russian menace actors, all elevate important purple flags.”
The Hacker Information has reached out to RalfHacker for remark, and we’ll replace the story if we hear again.

The Hacker News Tags:AdaptixC2, Advanced, Attacks, Gangs, OpenSource, Ransomware, Russian, Weaponize

Post navigation

Previous Post: RediShell RCE Vulnerability Exposes 8,500+ Redis Instances to Code Execution Attacks
Next Post: Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Related Posts

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers The Hacker News
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign The Hacker News
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards The Hacker News
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters The Hacker News
Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist The Hacker News
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of VMware Tools and Aria Operations 0-Day Vulnerability Exploited in Attacks
  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of VMware Tools and Aria Operations 0-Day Vulnerability Exploited in Attacks
  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News