Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

Posted on October 30, 2025October 30, 2025 By CWS

Oct 30, 2025Ravie LakshmananMalware / Cybercrime
The open-source command-and-control (C2) framework often known as AdaptixC2 is being utilized by a rising variety of menace actors, a few of whom are associated to Russian ransomware gangs.
AdaptixC2 is an rising extensible post-exploitation and adversarial emulation framework designed for penetration testing. Whereas the server part is written in Golang, the GUI Shopper is written in C++ QT for cross-platform compatibility.
It comes with a variety of options, together with totally encrypted communications, command execution, credential and screenshot managers, and a distant terminal, amongst others. An early iteration was publicly launched by a GitHub person named “RalfHacker” (@HackerRalf on X) in August 2024, who describes themselves as a penetration tester, purple workforce operator, and “MalDev” (quick for malware developer).

In latest months, AdaptixC2 has been adopted by numerous hacking teams, together with menace actors tied to the Fog and Akira ransomware operations, in addition to by an preliminary entry dealer that has leveraged CountLoader in assaults which might be designed to ship numerous post-exploitation instruments.
Palo Alto Networks Unit 42, which broke down the technical points of the framework final month, characterised it as a modular and versatile framework that can be utilized to “comprehensively management impacted machines,” and that it has been put to make use of as a part of pretend assist desk assist name scams by way of Microsoft Groups and thru a man-made intelligence (AI)-generated PowerShell script.
Whereas AdaptixC2 is obtainable as an moral, open-source device for purple teaming actions, it is also clear that it has attracted the eye of cybercriminals.
Cybersecurity firm Silent Push stated RalfHacker’s GitHub bio about them being a “MalDev” triggered an investigation, permitting them to seek out a number of e-mail addresses for GitHub accounts linked to the account’s proprietor, along with a Telegram channel known as RalfHackerChannel, the place they re-shared messages posted on a devoted channel for AdaptixC2. The RalfHackerChannel channel has greater than 28,000 subscribers.

In a message on the AdaptixFramework channel in August 2024, they talked about their curiosity in beginning a undertaking a few “public C2, which could be very stylish proper now” and hoped “will probably be like Empire,” one other common post-exploitation and adversary emulation framework.
Whereas it is presently not identified if RalfHacker has any direct involvement in malicious exercise tied to AdaptixC2 or CountLoader at this stage, Silent Push stated their “ties to Russia’s legal underground, by way of using Telegram for advertising and marketing and the device’s subsequent uptick in utilization by Russian menace actors, all elevate important purple flags.”
The Hacker Information has reached out to RalfHacker for remark, and we’ll replace the story if we hear again.

The Hacker News Tags:AdaptixC2, Advanced, Attacks, Gangs, OpenSource, Ransomware, Russian, Weaponize

Post navigation

Previous Post: CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server
Next Post: Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Related Posts

UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit The Hacker News
Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More The Hacker News
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse The Hacker News
New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code The Hacker News
SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers The Hacker News
CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News