Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries

New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries

Posted on August 13, 2025August 13, 2025 By CWS

A complicated new menace actor group dubbed “Curly COMrades” has emerged as a major cybersecurity concern, conducting focused espionage campaigns in opposition to vital organizations in international locations experiencing substantial geopolitical shifts.

The group has been actively pursuing long-term community entry and credential theft operations since mid-2024, with a selected concentrate on judicial and authorities our bodies in Georgia, in addition to vitality distribution corporations in Moldova.

The menace actor’s operations symbolize a methodical method to cyber espionage, characterised by their heavy reliance on proxy instruments and strategic use of compromised authentic web sites as visitors relays.

This tactic considerably complicates detection efforts by mixing malicious communications with regular community exercise, permitting them to bypass safety defenses that sometimes belief recognized domains whereas obscuring their true infrastructure.

Bitdefender analysts recognized the group’s main goal as sustaining persistent entry to focus on networks whereas systematically harvesting legitimate credentials.

The attackers repeatedly tried to extract the NTDS database from area controllers, which serves as the first repository for consumer password hashes and authentication knowledge in Home windows networks.

Moreover, they targeted on dumping LSASS reminiscence from particular programs to get well lively consumer credentials, together with probably plain-text passwords from machines the place customers remained logged in.

The naming conference “Curly COMrades” displays each the group’s technical methodologies and a deliberate try and de-glamorize cybercrime.

Resocks acts as a relay level right into a compromised community. On this case, Community A represents an attacker, and Community B represents a sufferer (Supply – Bitdefender)

The designation stems from their in depth use of curl.exe for command-and-control communications and knowledge exfiltration, mixed with their subtle exploitation of Part Object Mannequin (COM) objects for persistence mechanisms.

Essentially the most technically subtle side of Curly COMrades’ arsenal entails their deployment of MucorAgent, a beforehand unknown three-stage malware that employs an revolutionary persistence mechanism by way of CLSID hijacking.

This method targets the Native Picture Generator (NGEN), a default Home windows .NET Framework element that pre-compiles assemblies for improved efficiency.

The malware establishes persistence by hijacking the COM handler with CLSID {de434264-8fe9-4c0b-a83b-89ebeebff78e}, which is related to the “.NET Framework NGEN v4.0.30319 Vital” scheduled job.

Whereas this job stays disabled by default, the Home windows working system periodically permits and executes it throughout unpredictable intervals, reminiscent of system idle instances or new software deployments.

reg add HKEY_USERSSOFTWAREClassesCLSID{de434264-8fe9-4c0b-a83b-89ebeebff78e}InprocServer32 /t REG_SZ /d “C:WindowsSystem32mscoree.dll” /F
reg add HKEY_USERSSOFTWAREClassesCLSID{de434264-8fe9-4c0b-a83b-89ebeebff78e}InprocServer32 /v Meeting /t REG_SZ /d “TaskLauncher, Model=1.0.0.0, Tradition=impartial, PublicKeyToken=null” /F

This method gives a number of benefits for the attackers, together with stealth execution below the extremely privileged SYSTEM account and covert entry restoration throughout authentic system optimization processes.

The unpredictability of NGEN job execution instances means that attackers probably employed parallel, extra dependable triggers to make sure constant entry to compromised programs.

This revolutionary method to COM hijacking along side NGEN represents an unprecedented persistence mechanism that demonstrates the group’s subtle understanding of Home windows internals and their dedication to sustaining long-term community entry.

Increase your SOC and assist your staff defend your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:APT, Attacking, COMrades, Countries, Critical, Curly, Hackers, Organizations, Targeting

Post navigation

Previous Post: Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability
Next Post: Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam

Related Posts

Telegram-Based ResokerRAT Threatens Windows Security Telegram-Based ResokerRAT Threatens Windows Security Cyber Security News
CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks Cyber Security News
Threat Actors Using AI Generated Malicious Job Offers to Deploy PureRAT Threat Actors Using AI Generated Malicious Job Offers to Deploy PureRAT Cyber Security News
China-Linked Silver Dragon Uses Google Drive in Cyberattacks China-Linked Silver Dragon Uses Google Drive in Cyberattacks Cyber Security News
SmarterTools SmarterMail Vulnerability Enables Remote Code Execution Attack SmarterTools SmarterMail Vulnerability Enables Remote Code Execution Attack Cyber Security News
Malware Targets Developers via Rogue npm Package Malware Targets Developers via Rogue npm Package Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark