Article Details
Scrape Timestamp (UTC): 2025-10-30 16:43:54.867
Source: https://thehackernews.com/2025/10/russian-ransomware-gangs-weaponize-open.html
Original Article Text
Click to Toggle View
Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks. The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are related to Russian ransomware gangs. AdaptixC2 is an emerging extensible post-exploitation and adversarial emulation framework designed for penetration testing. While the server component is written in Golang, the GUI Client is written in C++ QT for cross-platform compatibility. It comes with a wide range of features, including fully encrypted communications, command execution, credential and screenshot managers, and a remote terminal, among others. An early iteration was publicly released by a GitHub user named "RalfHacker" (@HackerRalf on X) in August 2024, who describes themselves as a penetration tester, red team operator, and "MalDev" (short for malware developer). In recent months, AdaptixC2 has been adopted by various hacking groups, including threat actors tied to the Fog and Akira ransomware operations, as well as by an initial access broker that has leveraged CountLoader in attacks that are designed to deliver various post-exploitation tools. Palo Alto Networks Unit 42, which broke down the technical aspects of the framework last month, characterized it as a modular and versatile framework that can be used to "comprehensively control impacted machines," and that it has been put to use as part of fake help desk support call scams via Microsoft Teams and through an artificial intelligence (AI)-generated PowerShell script. While AdaptixC2 is offered as an ethical, open-source tool for red teaming activities, it's also clear that it has attracted the attention of cybercriminals. Cybersecurity company Silent Push said RalfHacker's GitHub bio about them being a "MalDev" triggered an investigation, allowing them to find several email addresses for GitHub accounts linked to the account's owner, in addition to a Telegram channel called RalfHackerChannel, where they re-shared messages posted on a dedicated channel for AdaptixC2. The RalfHackerChannel channel has more than 28,000 subscribers. In a message on the AdaptixFramework channel in August 2024, they mentioned their interest in starting a project about a "public C2, which is very trendy right now" and hoped "it will be like Empire," another popular post-exploitation and adversary emulation framework. While it's currently not known if RalfHacker has any direct involvement in malicious activity tied to AdaptixC2 or CountLoader at this stage, Silent Push said their "ties to Russia's criminal underground, via the use of Telegram for marketing and the tool's subsequent uptick in utilization by Russian threat actors, all raise significant red flags." The Hacker News has reached out to RalfHacker for comment, and we will update the story if we hear back.
Daily Brief Summary
AdaptixC2, an open-source command-and-control framework, is increasingly used by Russian ransomware groups for advanced cyberattacks, raising concerns over its misuse beyond ethical penetration testing.
Originally intended for red teaming, AdaptixC2 offers features like encrypted communications and remote terminal access, making it attractive for cybercriminals seeking comprehensive control over compromised systems.
Palo Alto Networks Unit 42 identified the framework's use in fake help desk scams via Microsoft Teams and AI-generated PowerShell scripts, highlighting its versatility in cybercrime operations.
Silent Push's investigation linked AdaptixC2's creator, "RalfHacker," to Russia's criminal underground, using platforms like Telegram to promote the tool, which has amassed over 28,000 subscribers.
The tool's adoption by groups associated with Fog and Akira ransomware operations, alongside initial access brokers, signals a growing trend of leveraging open-source tools for malicious purposes.
While no direct involvement of RalfHacker in criminal activities has been confirmed, the tool's increasing use by threat actors necessitates heightened vigilance and monitoring.
Organizations are advised to strengthen defenses against post-exploitation tools like AdaptixC2, focusing on detection and response strategies to mitigate potential threats.