Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

Posted on October 31, 2025October 31, 2025 By CWS

A brand new wave of cyber threats is rising as criminals more and more weaponize AdaptixC2, a free and open-source Command and Management framework initially designed for authentic penetration testing and pink staff operations.

Safety researchers have uncovered a disturbing pattern the place superior risk actors deploy this extensible post-exploitation device throughout international ransomware campaigns, remodeling a utility meant for moral hacking right into a harmful weapon for prison enterprises.

The framework, written in Golang for its server element with a C++ and QT-based GUI shopper supporting Linux, Home windows, and macOS, gives attackers with flexibility and multi-platform compatibility that makes it notably enticing for coordinated operations.

The abuse of AdaptixC2 was first found throughout intensive analysis into CountLoader, a classy malware loader that served malicious AdaptixC2 payloads from attacker-controlled infrastructure.

AdaptixC2 Framework interface (Supply – Silent Push)

Silent Push analysts recognized and tracked these malicious deployments, subsequently creating devoted detection signatures to determine each threats.

Following the implementation of those protecting measures, a number of public experiences highlighted a surge in AdaptixC2 utilization amongst ransomware associates, notably these related to operations like Akira.

This has compromised over 250 organizations since March 2023 and allegedly claimed $42 million in ransom proceeds.

Silent Push researchers famous that the escalating abuse of AdaptixC2 reveals subtle risk actors leveraging authentic improvement instruments to masks their malicious intentions.

The framework allows post-exploitation capabilities that enable attackers to ascertain persistent command channels, execute arbitrary instructions throughout compromised programs, and preserve lateral motion inside goal networks.

The technical structure helps a number of listener varieties together with mTLS, HTTP, SMB, and BTCP protocols, offering operators with various communication channels that complicate detection and network-based monitoring.

Russian Underground Ties and Developer Attribution

Investigation into the framework’s origins revealed important connections to the Russian prison underworld.

AdaptixC2 Framework repository (Supply – Silent Push)

A person working beneath the deal with “RalfHacker” seems to be the first developer behind AdaptixC2, managing the venture by means of lively GitHub commits and sustaining a Russian-language Telegram gross sales channel for the framework.

RalfHacker (Supply – Silent Push)

OSINT analysis uncovered e mail addresses related to RalfHacker’s accounts, together with references in leaked databases belonging to established hacking boards equivalent to RaidForums, establishing credible ties to organized cybercriminal communities.

The developer’s Telegram channel predominantly communicates in Russian, promoting framework updates with hashtags referencing Energetic Listing, APT ways, and ATM-related supplies, additional solidifying connections to Russian risk actor networks actively exploiting the platform for ransomware operations.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actively, Actors, Deliver, Framework, Malicious, OpenSource, Payloads, Threat

Post navigation

Previous Post: Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
Next Post: Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks

Related Posts

New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence Cyber Security News
CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks Cyber Security News
SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware Cyber Security News
Silver Fox APT Hackers Leveraging Vulnerable Driver to Attack Windows 10 and 11 Systems by Evading EDR/AV Cyber Security News
New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection Cyber Security News
SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News