Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
AI 生成的图像

Russian hackers use Linux VMs to hide malware on Windows

AI 生成的图像

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

The attack begins with the initial compromise of Windows machines, often through vulnerabilities or social engineering. Attackers then enable Hyper-V—a built-in virtualization feature in Windows 10—using Deployment Image Servicing and Management Tools (DISM) while disabling management interfaces to avoid detection. Observed as early as July 2024, they deploy a small RAR archive disguised as a video file, which contains configuration files and a virtual disk for a pre-configured Alpine Linux environment. This VM, named 'WSL' to mimic the legitimate Windows Subsystem for Linux, requires only 120 MB of disk space and 256 MB of RAM, making it resource-efficient and stealthy.

Inside the VM, the hackers run CurlyShell, a custom reverse shell built with the libcurl library for command execution via HTTPS connections to command-and-control servers, and CurlCat, a reverse proxy for tunneling traffic. The VM uses default network adapters and Hyper-V's internal NAT service, routing malicious communications through the host Windows IP address to mask origins and bypass endpoint detection and response (EDR) solutions. Additional persistence is achieved with tools like Ligolo-ng, CCProxy, Stunnel, SSH, Resocks, and Rsockstun, alongside PowerShell scripts that inject Kerberos tickets into the LSASS process and create local accounts via Group Policy.

Bitdefender's senior security researcher Victor Vrabie explained: 'By isolating the malware and its execution environment within a VM, the attackers effectively create a parallel world that’s invisible to most security solutions on the host.' The group, aligned with Russian geopolitical interests and linked to aliases like Void Blizzard or LAUNDRY BEAR, has targeted institutions in Georgia, Moldova, Europe, North America, and possibly Ukraine, focusing on government, defense, and healthcare sectors. This method represents a growing trend of using Linux malware against Windows to evade sophisticated EDR, similar to tactics in Qilin ransomware attacks. Experts recommend monitoring for unexpected Hyper-V activations, implementing behavioral analysis in virtual environments, and enhancing network-based inspections to counter such threats.

相关文章

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
AI 生成的图像

Linux CopyFail exploit threatens root access amid Ubuntu outage

由 AI 报道 AI 生成的图像

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

由 AI 报道

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Security researchers at Cyble have discovered a new Linux malware called ClipXDaemon, which hijacks cryptocurrency wallet addresses by altering clipboard content on X11-based systems. The malware operates without command-and-control servers, monitoring and replacing addresses in real time to redirect funds to attackers. It uses a multi-stage infection process and employs stealth techniques to evade detection.

由 AI 报道

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝