Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

Posted on October 31, 2025October 31, 2025 By CWS

A brand new wave of cyber threats is rising as criminals more and more weaponize AdaptixC2, a free and open-source Command and Management framework initially designed for authentic penetration testing and pink staff operations.

Safety researchers have uncovered a disturbing pattern the place superior risk actors deploy this extensible post-exploitation device throughout international ransomware campaigns, remodeling a utility meant for moral hacking right into a harmful weapon for prison enterprises.

The framework, written in Golang for its server element with a C++ and QT-based GUI shopper supporting Linux, Home windows, and macOS, gives attackers with flexibility and multi-platform compatibility that makes it notably enticing for coordinated operations.

The abuse of AdaptixC2 was first found throughout intensive analysis into CountLoader, a classy malware loader that served malicious AdaptixC2 payloads from attacker-controlled infrastructure.

AdaptixC2 Framework interface (Supply – Silent Push)

Silent Push analysts recognized and tracked these malicious deployments, subsequently creating devoted detection signatures to determine each threats.

Following the implementation of those protecting measures, a number of public experiences highlighted a surge in AdaptixC2 utilization amongst ransomware associates, notably these related to operations like Akira.

This has compromised over 250 organizations since March 2023 and allegedly claimed $42 million in ransom proceeds.

Silent Push researchers famous that the escalating abuse of AdaptixC2 reveals subtle risk actors leveraging authentic improvement instruments to masks their malicious intentions.

The framework allows post-exploitation capabilities that enable attackers to ascertain persistent command channels, execute arbitrary instructions throughout compromised programs, and preserve lateral motion inside goal networks.

The technical structure helps a number of listener varieties together with mTLS, HTTP, SMB, and BTCP protocols, offering operators with various communication channels that complicate detection and network-based monitoring.

Russian Underground Ties and Developer Attribution

Investigation into the framework’s origins revealed important connections to the Russian prison underworld.

AdaptixC2 Framework repository (Supply – Silent Push)

A person working beneath the deal with “RalfHacker” seems to be the first developer behind AdaptixC2, managing the venture by means of lively GitHub commits and sustaining a Russian-language Telegram gross sales channel for the framework.

RalfHacker (Supply – Silent Push)

OSINT analysis uncovered e mail addresses related to RalfHacker’s accounts, together with references in leaked databases belonging to established hacking boards equivalent to RaidForums, establishing credible ties to organized cybercriminal communities.

The developer’s Telegram channel predominantly communicates in Russian, promoting framework updates with hashtags referencing Energetic Listing, APT ways, and ATM-related supplies, additional solidifying connections to Russian risk actor networks actively exploiting the platform for ransomware operations.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actively, Actors, Deliver, Framework, Malicious, OpenSource, Payloads, Threat

Post navigation

Previous Post: Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
Next Post: Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks

Related Posts

DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely Cyber Security News
Chinese Hackers Exploit Microsoft Exchange Servers to Steal COVID-19 Research Data Chinese Hackers Exploit Microsoft Exchange Servers to Steal COVID-19 Research Data Cyber Security News
Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses Cyber Security News
FreePBX SQL Injection Vulnerability Exploited to Modify The Database FreePBX SQL Injection Vulnerability Exploited to Modify The Database Cyber Security News
Windows Docker Desktop Vulnerability Leads to Full Host Compromise Windows Docker Desktop Vulnerability Leads to Full Host Compromise Cyber Security News
Pastebin PowerShell Script Targets Telegram Sessions Pastebin PowerShell Script Targets Telegram Sessions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark