Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

Posted on November 6, 2025November 6, 2025 By CWS

Nov 06, 2025Ravie LakshmananMalware / Community Safety
The risk actor referred to as Curly COMrades has been noticed exploiting virtualization applied sciences as a strategy to bypass safety options and execute customized malware.
In keeping with a brand new report from Bitdefender, the adversary is claimed to have enabled the Hyper-V position on chosen sufferer techniques to deploy a minimalistic, Alpine Linux-based digital machine.
“This hidden atmosphere, with its light-weight footprint (solely 120MB disk area and 256MB reminiscence), hosted their customized reverse shell, CurlyShell, and a reverse proxy, CurlCat,” safety researcher Victor Vrabie, together with Adrian Schipor and Martin Zugec, stated in a technical report.

Curly COMrades was first documented by the Romanian cybersecurity vendor in August 2025 in reference to a collection of assaults focusing on Georgia and Moldova. The exercise cluster is assessed to be lively since late 2023, working with pursuits which might be aligned with Russia.
These assaults have been discovered to deploy instruments like CurlCat for bidirectional knowledge switch, RuRat for persistent distant entry, Mimikatz for credential harvesting, and a modular .NET implant dubbed MucorAgent, with early iterations relationship again all the way in which to November 2023.
In a follow-up evaluation performed in collaboration with Georgia CERT, extra tooling related to the risk actor has been recognized, alongside makes an attempt to determine long-term entry by weaponizing Hyper-V on compromised Home windows 10 hosts to arrange a hidden distant working atmosphere.

“By isolating the malware and its execution atmosphere inside a VM, the attackers successfully bypassed many conventional host-based EDR detections,” the researchers stated. “The risk actor demonstrated a transparent willpower to keep up a reverse proxy functionality, repeatedly introducing new tooling into the atmosphere.”
In addition to utilizing Resocks, Rsockstun, Ligolo-ng, CCProxy, Stunnel, and SSH-based strategies for proxy and tunneling, Curly COMrades has employed numerous different instruments, together with a PowerShell script designed for distant command execution and CurlyShell, a beforehand undocumented ELF binary deployed within the digital machine that gives a persistent reverse shell.

Written in C++, the malware is executed as a headless background daemon to connect with a command-and-control (C2) server and launch a reverse shell, permitting the risk actors to run encrypted instructions. Communication is achieved by way of HTTP GET requests to ballot the server for brand spanking new instructions and utilizing HTTP POST requests to transmit the outcomes of the command execution again to the server.
“Two customized malware households – CurlyShell and CurlCat – have been on the heart of this exercise, sharing a largely equivalent code base however diverging in how they dealt with obtained knowledge: CurlyShell executed instructions straight, whereas CurlCat funneled visitors by way of SSH,” Bitdefender stated. “These instruments have been deployed and operated to make sure versatile management and adaptableness.”

The Hacker News Tags:Detection, EDR, Evade, Hackers, Hide, HyperV, Linux, Weaponize, Windows

Post navigation

Previous Post: SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach
Next Post: State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack

Related Posts

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware The Hacker News
New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves The Hacker News
How Passwork 7 Addresses Complexity of Enterprise Security How Passwork 7 Addresses Complexity of Enterprise Security The Hacker News
Winning Against AI-Based Attacks Requires a Combined Defensive Approach Winning Against AI-Based Attacks Requires a Combined Defensive Approach The Hacker News
Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild The Hacker News
Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Remote File Upload Vulnerability in Cisco Meeting Management
  • Critical Security Updates Released by Cisco and F5
  • DesckVB RAT 2.9: Advanced Threat with Modular Plugins
  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Remote File Upload Vulnerability in Cisco Meeting Management
  • Critical Security Updates Released by Cisco and F5
  • DesckVB RAT 2.9: Advanced Threat with Modular Plugins
  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark