Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

Posted on October 30, 2025October 30, 2025 By CWS

Oct 30, 2025Ravie LakshmananMalware / Cybercrime
The open-source command-and-control (C2) framework often known as AdaptixC2 is being utilized by a rising variety of menace actors, a few of whom are associated to Russian ransomware gangs.
AdaptixC2 is an rising extensible post-exploitation and adversarial emulation framework designed for penetration testing. Whereas the server part is written in Golang, the GUI Shopper is written in C++ QT for cross-platform compatibility.
It comes with a variety of options, together with totally encrypted communications, command execution, credential and screenshot managers, and a distant terminal, amongst others. An early iteration was publicly launched by a GitHub person named “RalfHacker” (@HackerRalf on X) in August 2024, who describes themselves as a penetration tester, purple workforce operator, and “MalDev” (quick for malware developer).

In latest months, AdaptixC2 has been adopted by numerous hacking teams, together with menace actors tied to the Fog and Akira ransomware operations, in addition to by an preliminary entry dealer that has leveraged CountLoader in assaults which might be designed to ship numerous post-exploitation instruments.
Palo Alto Networks Unit 42, which broke down the technical points of the framework final month, characterised it as a modular and versatile framework that can be utilized to “comprehensively management impacted machines,” and that it has been put to make use of as a part of pretend assist desk assist name scams by way of Microsoft Groups and thru a man-made intelligence (AI)-generated PowerShell script.
Whereas AdaptixC2 is obtainable as an moral, open-source device for purple teaming actions, it is also clear that it has attracted the eye of cybercriminals.
Cybersecurity firm Silent Push stated RalfHacker’s GitHub bio about them being a “MalDev” triggered an investigation, permitting them to seek out a number of e-mail addresses for GitHub accounts linked to the account’s proprietor, along with a Telegram channel known as RalfHackerChannel, the place they re-shared messages posted on a devoted channel for AdaptixC2. The RalfHackerChannel channel has greater than 28,000 subscribers.

In a message on the AdaptixFramework channel in August 2024, they talked about their curiosity in beginning a undertaking a few “public C2, which could be very stylish proper now” and hoped “will probably be like Empire,” one other common post-exploitation and adversary emulation framework.
Whereas it is presently not identified if RalfHacker has any direct involvement in malicious exercise tied to AdaptixC2 or CountLoader at this stage, Silent Push stated their “ties to Russia’s legal underground, by way of using Telegram for advertising and marketing and the device’s subsequent uptick in utilization by Russian menace actors, all elevate important purple flags.”
The Hacker Information has reached out to RalfHacker for remark, and we’ll replace the story if we hear again.

The Hacker News Tags:AdaptixC2, Advanced, Attacks, Gangs, OpenSource, Ransomware, Russian, Weaponize

Post navigation

Previous Post: RediShell RCE Vulnerability Exposes 8,500+ Redis Instances to Code Execution Attacks
Next Post: Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Related Posts

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security The Hacker News
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors The Hacker News
Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them The Hacker News
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks The Hacker News
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads
  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads
  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark