Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Picha iliyoundwa na AI

Russian hackers use Linux VMs to hide malware on Windows

Picha iliyoundwa na AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

The attack begins with the initial compromise of Windows machines, often through vulnerabilities or social engineering. Attackers then enable Hyper-V—a built-in virtualization feature in Windows 10—using Deployment Image Servicing and Management Tools (DISM) while disabling management interfaces to avoid detection. Observed as early as July 2024, they deploy a small RAR archive disguised as a video file, which contains configuration files and a virtual disk for a pre-configured Alpine Linux environment. This VM, named 'WSL' to mimic the legitimate Windows Subsystem for Linux, requires only 120 MB of disk space and 256 MB of RAM, making it resource-efficient and stealthy.

Inside the VM, the hackers run CurlyShell, a custom reverse shell built with the libcurl library for command execution via HTTPS connections to command-and-control servers, and CurlCat, a reverse proxy for tunneling traffic. The VM uses default network adapters and Hyper-V's internal NAT service, routing malicious communications through the host Windows IP address to mask origins and bypass endpoint detection and response (EDR) solutions. Additional persistence is achieved with tools like Ligolo-ng, CCProxy, Stunnel, SSH, Resocks, and Rsockstun, alongside PowerShell scripts that inject Kerberos tickets into the LSASS process and create local accounts via Group Policy.

Bitdefender's senior security researcher Victor Vrabie explained: 'By isolating the malware and its execution environment within a VM, the attackers effectively create a parallel world that’s invisible to most security solutions on the host.' The group, aligned with Russian geopolitical interests and linked to aliases like Void Blizzard or LAUNDRY BEAR, has targeted institutions in Georgia, Moldova, Europe, North America, and possibly Ukraine, focusing on government, defense, and healthcare sectors. This method represents a growing trend of using Linux malware against Windows to evade sophisticated EDR, similar to tactics in Qilin ransomware attacks. Experts recommend monitoring for unexpected Hyper-V activations, implementing behavioral analysis in virtual environments, and enhancing network-based inspections to counter such threats.

Makala yanayohusiana

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Picha iliyoundwa na AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Imeripotiwa na AI Picha iliyoundwa na AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Imeripotiwa na AI

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Security researchers at Cyble have discovered a new Linux malware called ClipXDaemon, which hijacks cryptocurrency wallet addresses by altering clipboard content on X11-based systems. The malware operates without command-and-control servers, monitoring and replacing addresses in real time to redirect funds to attackers. It uses a multi-stage infection process and employs stealth techniques to evade detection.

Imeripotiwa na AI

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

Jumapili, 10. Mwezi wa tano 2026, 02:50:39

FBI urges router security steps after Russian GRU attacks

Jumanne, 5. Mwezi wa tano 2026, 12:10:37

Daemon Tools app hit by monthlong supply-chain attack

Jumamosi, 4. Mwezi wa nne 2026, 14:25:00

Daniel Stenberg warns of risks in curl project

Ijumaa, 6. Mwezi wa tatu 2026, 04:23:59

Linux rootkits advance with eBPF and io_uring techniques

Jumamosi, 14. Mwezi wa pili 2026, 06:39:37

SSHStalker botnet uses IRC to target Linux servers

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa