Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10

Posted on November 5, 2025November 5, 2025 By CWS

A classy risk actor referred to as Curly COMrades has deployed an modern assault methodology that leverages professional Home windows virtualization options to ascertain covert, long-term entry to sufferer networks.

The marketing campaign, which started in early July 2025, represents a major evolution in adversary ways as risk actors more and more search strategies to bypass endpoint detection and response options which have change into customary defensive instruments.

The operation facilities on the abuse of Hyper-V virtualization know-how on compromised Home windows 10 machines.

By enabling the Hyper-V position and deploying a minimalistic Alpine Linux-based digital machine, the attackers created a hidden operational setting that hosts customized malware whereas evading conventional host-based safety monitoring.

The digital machine, requiring solely 120MB of disk area and 256MB of reminiscence, gives a devoted platform for operating two customized implants: CurlyShell, a persistent reverse shell, and CurlCat, a reverse proxy device.

Bitdefender researchers recognized this superior marketing campaign by collaboration with the Georgian CERT, which detected a malicious pattern speaking with a compromised web site underneath monitoring.

The joint investigation revealed that Curly COMrades, first documented in August 2025 as a risk actor supporting Russian pursuits in geopolitical hotbeds, has considerably enhanced its toolkit and operational sophistication.

The forensic evaluation uncovered that attackers successfully remoted their malware execution setting inside a digital machine, bypassing many conventional safety detections by routing malicious visitors by the host’s community stack, making it seem to originate from professional IP addresses.

The assault demonstrates meticulous operational planning and technical experience. Menace actors established persistence by a number of mechanisms, together with PowerShell scripts configured through Group Coverage for native account creation and Kerberos ticket manipulation for lateral motion.

Assault circulate (Supply – Bitdefender)

The deployment of varied proxy and tunneling instruments reminiscent of Resocks, Rsockstun, Ligolo-ng, CCProxy, and Stunnel additional illustrates the group’s willpower to keep up versatile entry channels to compromised environments.

Digital Machine Deployment and Persistence Mechanism

The deployment sequence begins with enabling the Hyper-V virtualization characteristic whereas intentionally disabling its administration interface to cut back visibility. The attackers executed the next instructions remotely:

dism /on-line /disable-feature /FeatureName:microsoft-hyper-v-Administration-clients /norestart
dism /on-line /enable-feature /All /LimitAccess /FeatureName:microsoft-hyper-v /norestart

Following a quick interval, the risk actors initiated the payload supply section. A RAR archive disguised as a video file was downloaded and extracted to the misleading listing `c:programdatamicrosoftAppVapp`, a location designed to mix with professional Microsoft software virtualization recordsdata. The digital machine recordsdata have been then imported utilizing PowerShell:

powershell.exe -c import-vm -path “c:programdatamicrosoftAppVappDigital Machines1DBCC80B-5803-4AF1-8772-712C688F408A.vmcx” -Copy -GenerateNewId
powershell.exe -c Begin-VM -name WSL

The VM naming conference “WSL” serves as a deception tactic, suggesting using Home windows Subsystem for Linux, a generally trusted developer device that sometimes receives much less safety scrutiny. Nonetheless, it is a absolutely remoted Hyper-V occasion working outdoors the usual WSL framework.

Persistence inside the digital machine operates by a root-level crontab entry that executes each 4 hours at 20 minutes previous the hour.

The cron process runs `/bin/alpine_init`, which subsequently launches the CurlyShell implant positioned at `/bin/init_tools`.

This tradition reverse shell maintains HTTPS communication with the command and management infrastructure, whereas CurlCat manages SSH reverse proxy tunneling on demand.

The VM configuration makes use of Hyper-V’s Default Swap community adaptor with Community Deal with Translation, making certain all malicious outbound visitors seems to originate from the compromised host machine’s professional IP handle, considerably complicating attribution and detection efforts.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Access, Compromised, COMrades, Create, Curly, Group, Hacker, Hidden, Remote, Tools, Windows

Post navigation

Previous Post: Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
Next Post: Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

Related Posts

Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules Cyber Security News
New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach Cyber Security News
How Prompt Injection Attacks Bypassing AI Agents With Users Input Cyber Security News
DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats Cyber Security News
Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence Cyber Security News
Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks
  • Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
  • Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10
  • Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
  • FIN7 Hackers Using Windows SSH Backdoor to Establish Stealthy Remote Access and Persistence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks
  • Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
  • Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10
  • Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
  • FIN7 Hackers Using Windows SSH Backdoor to Establish Stealthy Remote Access and Persistence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News