Article Details
Scrape Timestamp (UTC): 2025-11-04 14:07:41.178
Original Article Text
Click to Toggle View
Russian hackers abuse Hyper-V to hide malware in Linux VMs. The Russian hacker group Curly COMrades has been abusing Microsoft's Hyper-V virtualization technology in Windows to bypass endpoint detection and response solutions by creating a hidden Alpine Linux-based virtual machine. Inside the virtual environment, the threat actor hosted its custom tools, the CurlyShell reverse shell and the CurlCat reverse proxy, which enabled operational stealth and communication. Curly COMrades is a cyber-espionage threat group believed to be active since mid-2024. Its activities are closely aligned with Russian geopolitical interests. Bitdefender previously exposed Curly COMrades activities against government and judicial bodies in Georgia, as well as energy firms in Moldova. With the help of the Georgian CERT, the Romanian cybersecurity firm uncovered more about the threat actor's latest operation. The researchers found that in early July, after gaining remote access to two machines, Curly COMrades executed commands to enable Hyper-V and disable its management interface. Microsoft includes the Hyper-V native hypervisor technology that provides hardware virtualization capabilities in Windows (Pro and Enterprise) and Windows Server operating systems, allowing users to run virtual machines (VMs). "The attackers enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. This hidden environment, with its lightweight footprint (only 120MB disk space and 256MB memory), hosted their custom reverse shell, CurlyShell, and a reverse proxy, CurlCat," Bitdefender explains in a report shared with BleepingComputer. By keeping the malware and its execution inside a virtual machine (VM), the hackers were able to bypass traditional host-based EDR detections, which lacked network inspection capabilities that could detect the threat actor's command and control (C2) traffic from the VM. Although relying on virtualization to evade detection is not a new technique, the fragmented coverage of security tools makes it an effective approach on networks that lack a holistic, multi-layered protection. In the Curly COMrades attacks, evasion was achieved by using the name 'WSL' for the VM, alluding to the Windows Subsystem for Linux feature in the operating system, in the hope of slipping unobserved. The Alpine Linux VM was configured in Hyper-V to use the Default Switch network adapter, which passed all the traffic through the host's network stack. "In effect, all malicious outbound communication appears to originate from the legitimate host machine's IP address," Bitdefender researchers explain. The two custom implants deployed in the VM are ELF binaries based on libcurl and are used for command execution and traffic tunneling: While investigating the incidents, the researchers also discovered that Curly COMrades used two PowerShell scripts for persistence and pivoting to remote systems. "One was designed to inject a Kerberos ticket into LSASS, enabling authentication to remote systems and execution of commands," the researchers say. The second script was deployed through the Group Policy feature and created a local account across machines on the same domain. The researchers note that the sophistication level of the investigated Curly COMrades attacks reveal an activity tailored for stealth and operational security. The hackers encrypted the embedded payloads and abused PowerShell capabilities, which led to minimum forensic traces on the compromised hosts. Based on the observations in these attacks, Bitdefender suggests that organizations should monitor for abnormal Hyper-V activation, LSASS access, or PowerShell scripts deployed via Group Policy that trigger local account password resets, or creating new ones. Secrets Security Cheat Sheet: From Sprawl to Control Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start. Get the cheat sheet and take the guesswork out of secrets management.
Daily Brief Summary
The Curly COMrades, a Russian cyber-espionage group, exploited Microsoft's Hyper-V to hide malware within Alpine Linux-based virtual machines, evading traditional endpoint detection and response systems.
This technique involved deploying a minimalistic virtual environment to host custom tools, CurlyShell and CurlCat, facilitating stealthy operations and communications.
Bitdefender, with Georgian CERT assistance, uncovered these activities targeting Georgian government bodies and Moldovan energy firms, aligning with Russian geopolitical interests.
Attackers activated Hyper-V on compromised systems, disabled its management interface, and used the Default Switch network adapter to mask malicious traffic as originating from legitimate IP addresses.
The use of ELF binaries and PowerShell scripts for persistence and lateral movement highlights the group's operational sophistication and focus on stealth.
Organizations are advised to monitor for unusual Hyper-V activations, LSASS access, and suspicious PowerShell script activities to mitigate such threats.
This case underlines the need for a multi-layered security approach to detect advanced evasion techniques leveraging virtualization technologies.