Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries

Posted on August 13, 2025August 13, 2025 By CWS

A complicated new menace actor group dubbed “Curly COMrades” has emerged as a major cybersecurity concern, conducting focused espionage campaigns in opposition to vital organizations in international locations experiencing substantial geopolitical shifts.

The group has been actively pursuing long-term community entry and credential theft operations since mid-2024, with a selected concentrate on judicial and authorities our bodies in Georgia, in addition to vitality distribution corporations in Moldova.

The menace actor’s operations symbolize a methodical method to cyber espionage, characterised by their heavy reliance on proxy instruments and strategic use of compromised authentic web sites as visitors relays.

This tactic considerably complicates detection efforts by mixing malicious communications with regular community exercise, permitting them to bypass safety defenses that sometimes belief recognized domains whereas obscuring their true infrastructure.

Bitdefender analysts recognized the group’s main goal as sustaining persistent entry to focus on networks whereas systematically harvesting legitimate credentials.

The attackers repeatedly tried to extract the NTDS database from area controllers, which serves as the first repository for consumer password hashes and authentication knowledge in Home windows networks.

Moreover, they targeted on dumping LSASS reminiscence from particular programs to get well lively consumer credentials, together with probably plain-text passwords from machines the place customers remained logged in.

The naming conference “Curly COMrades” displays each the group’s technical methodologies and a deliberate try and de-glamorize cybercrime.

Resocks acts as a relay level right into a compromised community. On this case, Community A represents an attacker, and Community B represents a sufferer (Supply – Bitdefender)

The designation stems from their in depth use of curl.exe for command-and-control communications and knowledge exfiltration, mixed with their subtle exploitation of Part Object Mannequin (COM) objects for persistence mechanisms.

Essentially the most technically subtle side of Curly COMrades’ arsenal entails their deployment of MucorAgent, a beforehand unknown three-stage malware that employs an revolutionary persistence mechanism by way of CLSID hijacking.

This method targets the Native Picture Generator (NGEN), a default Home windows .NET Framework element that pre-compiles assemblies for improved efficiency.

The malware establishes persistence by hijacking the COM handler with CLSID {de434264-8fe9-4c0b-a83b-89ebeebff78e}, which is related to the “.NET Framework NGEN v4.0.30319 Vital” scheduled job.

Whereas this job stays disabled by default, the Home windows working system periodically permits and executes it throughout unpredictable intervals, reminiscent of system idle instances or new software deployments.

reg add HKEY_USERSSOFTWAREClassesCLSID{de434264-8fe9-4c0b-a83b-89ebeebff78e}InprocServer32 /t REG_SZ /d “C:WindowsSystem32mscoree.dll” /F
reg add HKEY_USERSSOFTWAREClassesCLSID{de434264-8fe9-4c0b-a83b-89ebeebff78e}InprocServer32 /v Meeting /t REG_SZ /d “TaskLauncher, Model=1.0.0.0, Tradition=impartial, PublicKeyToken=null” /F

This method gives a number of benefits for the attackers, together with stealth execution below the extremely privileged SYSTEM account and covert entry restoration throughout authentic system optimization processes.

The unpredictability of NGEN job execution instances means that attackers probably employed parallel, extra dependable triggers to make sure constant entry to compromised programs.

This revolutionary method to COM hijacking along side NGEN represents an unprecedented persistence mechanism that demonstrates the group’s subtle understanding of Home windows internals and their dedication to sustaining long-term community entry.

Increase your SOC and assist your staff defend your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:APT, Attacking, COMrades, Countries, Critical, Curly, Hackers, Organizations, Targeting

Post navigation

Previous Post: Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability
Next Post: Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam

Related Posts

Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News
Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data Cyber Security News
Critical Apache Commons Text Vulnerability Enables Remote Code Execution Attacks Cyber Security News
SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security Cyber Security News
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026 Cyber Security News
Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark