More

    Russian hackers hit Windows machines via Linux VMs with new custom malware



    • Curly COMrades deployed Alpine Linux VMs on Windows hosts to hide reverse-shell malware activity
    • VM traffic tunneled via host IP, bypassing traditional EDR and masking outbound communications
    • Targets included Georgian and Moldovan institutions; operations align with Russian geopolitical interests

    Russian hackers known as Curly COMrades have been seen hiding their malware in Linux-based virtual machines (VM) deployed on Windows devices, experts have warned.

    Security researchers from Bitdefender after analyzing the latest activities together with the Georgian Computer Emergency Response Team (CERT), found Curly COMrades first started targeting their victims in July 2025, when they ran remote commands to enable the microsoft-hyper-v virtualization feature and disable its management interface.


    https://cdn.mos.cms.futurecdn.net/oyeak7xZpCgbD69FFSjk7Y-1280-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img