Curly COMrades Strike Again: Russian Hackers Exploit Microsoft’s Hyper-V for Sneaky Cyber Espionage!
Curly COMrades is using Microsoft’s Hyper-V to stealthily bypass endpoint detection. By hiding their tools in an Alpine Linux virtual machine, they effectively cloak operations from security solutions. This Russian hacker group is making a name for itself with its comedic timing of naming conventions but serious geopolitical cyber-espionage activities.

Hot Take:
Well, well, well, looks like the Curly COMrades are at it again, and this time they’ve decided to play hide and seek with Microsoft’s Hyper-V. Who knew Russian hackers moonlighted as virtual magicians? But hey, when it comes to cyber-espionage, why settle for the real world when you can create your own virtual one? Bravo, Curly COMrades, for taking “living in your own world” to a whole new level!
Key Points:
– Curly COMrades are using Microsoft’s Hyper-V to secretly host an Alpine Linux VM for their activities.
– The group deploys custom tools called CurlyShell and CurlCat for stealthy operations.
– Their operations are aligned with Russian geopolitical interests, targeting entities like government bodies in Georgia and energy firms in Moldova.
– The hackers circumvent traditional EDR detections by operating within a virtual environment.
– Bitdefender advises increased monitoring for unusual Hyper-V activity and suspicious PowerShell scripts.
