Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware

Posted on August 16, 2025August 16, 2025 By CWS

Aug 16, 2025Ravie LakshmananMalware / Vulnerability
The menace actor often known as EncryptHub is constant to use a now-patched safety flaw impacting Microsoft Home windows to ship malicious payloads.
Trustwave SpiderLabs stated it just lately noticed an EncryptHub marketing campaign that brings collectively social engineering and the exploitation of a vulnerability within the Microsoft Administration Console (MMC) framework (CVE-2025-26633, aka MSC EvilTwin) to set off the an infection routine through a rogue Microsoft Console (MSC) file.
“These actions are a part of a broad, ongoing wave of malicious exercise that blends social engineering with technical exploitation to bypass safety defenses and achieve management over inside environments,” Trustwave researchers Nathaniel Morales and Nikita Kazymirskyi stated.
EncryptHub, additionally tracked as LARVA-208 and Water Gamayun, is a Russian hacking group that first gained prominence in mid-2024. Working at a excessive tempo, the financially motivated crew is understood for leveraging a number of strategies, together with faux job provides, portfolio overview, and even compromising Steam video games, to contaminate targets with stealer malware.

The menace actor’s abuse of CVE-2025-26633 was beforehand documented by Development Micro in March 2025, uncovering assaults that ship two backdoors known as SilentPrism and DarkWisp.
The newest assault sequence entails the menace actor claiming to be from the IT division and sending a Microsoft Groups request to the goal with the aim of initiating a distant connection and deploying secondary payloads by the use of PowerShell instructions.
Among the many recordsdata dropped are two MSC recordsdata with the identical identify, one benign and the opposite malicious, that is used to set off CVE-2025-26633, in the end ensuing within the execution of the rogue MSC file when its innocuous counterpart is launched.

The MSC file, for its half, fetches and executes from an exterior server one other PowerShell script that collects system data, establishes persistence on the host, and communicates with an EncryptHub command-and-control (C2) server to obtain and run malicious payloads, together with a stealer known as Fickle Stealer.

“The script receives AES-encrypted instructions from the attacker, decrypts them, and runs the payloads instantly on the contaminated machine,” the researchers stated.
Additionally deployed by the menace actor over the course of the assault is a Go-based loader codenamed SilentCrystal, which abuses Courageous Assist, a professional platform related to the Courageous internet browser, to host next-stage malware – a ZIP archive containing the 2 MSC recordsdata to weaponize CVE-2025-26633.
What makes this vital is that importing file attachments on the Courageous Assist platform is restricted for brand spanking new customers, indicating that the attackers someway managed to acquire unauthorized entry to an account with add permissions to tug off the scheme.

Among the different instruments deployed embody a Golang backdoor that operates in each consumer and server mode to ship system metadata to the C2 server, in addition to arrange C2 infrastructure by making use of the SOCKS5 proxy tunneling protocol.
There’s additionally proof that the menace actors are persevering with to depend on videoconferencing lures, this time organising phony platforms like RivaTalk to deceive victims into downloading an MSI installer.
Working the installer results in the supply of a number of recordsdata: the professional Early Launch Anti-Malware (ELAM) installer binary from Symantec that is used to sideload a malicious DLL that, in flip, launches a PowerShell command to obtain and run one other PowerShell script.

It is engineered to collect system data and exfiltrate it to the C2 server, and await encrypted PowerShell directions which might be decoded and executed to offer attackers full management of the system. The malware additionally shows a faux “System Configuration” pop-up message as a ruse, whereas launching a background job to generate faux browser visitors by making HTTP requests to standard web sites in order to mix C2 communications with regular community exercise.
“The EncryptHub menace actor represents a well-resourced and adaptive adversary, combining social engineering, abuse of trusted platforms, and the exploitation of system vulnerabilities to take care of persistence and management,” Trustwave stated.
“Their use of pretend video conferencing platforms, encrypted command constructions, and evolving malware toolsets underscores the significance of layered protection methods, ongoing menace intelligence, and person consciousness coaching.”

The Hacker News Tags:Deploy, EncryptHub, EvilTwin, Exploits, Fickle, Group, Malware, MSC, Russian, Stealer, Vulnerability

Post navigation

Previous Post: How to Secure Your Smart TV

Related Posts

CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog The Hacker News
Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More The Hacker News
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros The Hacker News
15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign The Hacker News
Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue The Hacker News
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware
  • How to Secure Your Smart TV
  • Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst
  • Ransomware Actors Blending Legitimate Tools with Custom Malware to Evade Detection
  • Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware
  • How to Secure Your Smart TV
  • Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst
  • Ransomware Actors Blending Legitimate Tools with Custom Malware to Evade Detection
  • Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News