Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Image generated by AI

Russian hackers use Linux VMs to hide malware on Windows

Image generated by AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

The attack begins with the initial compromise of Windows machines, often through vulnerabilities or social engineering. Attackers then enable Hyper-V—a built-in virtualization feature in Windows 10—using Deployment Image Servicing and Management Tools (DISM) while disabling management interfaces to avoid detection. Observed as early as July 2024, they deploy a small RAR archive disguised as a video file, which contains configuration files and a virtual disk for a pre-configured Alpine Linux environment. This VM, named 'WSL' to mimic the legitimate Windows Subsystem for Linux, requires only 120 MB of disk space and 256 MB of RAM, making it resource-efficient and stealthy.

Inside the VM, the hackers run CurlyShell, a custom reverse shell built with the libcurl library for command execution via HTTPS connections to command-and-control servers, and CurlCat, a reverse proxy for tunneling traffic. The VM uses default network adapters and Hyper-V's internal NAT service, routing malicious communications through the host Windows IP address to mask origins and bypass endpoint detection and response (EDR) solutions. Additional persistence is achieved with tools like Ligolo-ng, CCProxy, Stunnel, SSH, Resocks, and Rsockstun, alongside PowerShell scripts that inject Kerberos tickets into the LSASS process and create local accounts via Group Policy.

Bitdefender's senior security researcher Victor Vrabie explained: 'By isolating the malware and its execution environment within a VM, the attackers effectively create a parallel world that’s invisible to most security solutions on the host.' The group, aligned with Russian geopolitical interests and linked to aliases like Void Blizzard or LAUNDRY BEAR, has targeted institutions in Georgia, Moldova, Europe, North America, and possibly Ukraine, focusing on government, defense, and healthcare sectors. This method represents a growing trend of using Linux malware against Windows to evade sophisticated EDR, similar to tactics in Qilin ransomware attacks. Experts recommend monitoring for unexpected Hyper-V activations, implementing behavioral analysis in virtual environments, and enhancing network-based inspections to counter such threats.

Related Articles

Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Image generated by AI

Qilin ransomware deploys Linux binaries against Windows systems

Reported by AI Image generated by AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Reported by AI

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

Reported by AI

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Reported by AI

Researchers have attributed a failed cyberattack on Poland's electric grid to Russian state hackers, coinciding with the 10th anniversary of a similar assault on Ukraine. The wiper malware aimed to disrupt power distribution but did not succeed in knocking out electricity. Security firm ESET linked the incident to the notorious Sandworm group.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline