Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. "This hidden environment, with its lightweight
AI Analysis
Technical Summary
Curly COMrades is a sophisticated threat actor group that has been observed weaponizing Windows Hyper-V virtualization technology to conceal malicious activities within a minimal Alpine Linux virtual machine (VM) deployed on compromised Windows 10 systems. By enabling the Hyper-V role on victim machines, the attackers create a hidden execution environment that hosts custom malware such as CurlyShell—a C++-based ELF binary providing a persistent reverse shell—and CurlCat, a reverse proxy tool. This VM-based approach allows the threat actors to isolate their malware from the host OS, effectively evading detection by traditional endpoint detection and response (EDR) solutions that monitor host-level processes and behaviors. The VM is lightweight, consuming only about 120MB of disk space and 256MB of memory, making it difficult to detect through resource monitoring. Communication with the command-and-control (C2) infrastructure is conducted via encrypted HTTP GET and POST requests, enabling the execution of encrypted commands and exfiltration of data. The group also employs a variety of proxy and tunneling tools such as Resocks, Rsockstun, Ligolo-ng, CCProxy, Stunnel, and SSH-based methods to maintain covert and resilient communication channels. Curly COMrades have been active since late 2023, with documented attacks primarily targeting Georgia and Moldova, aligning with Russian geopolitical interests. Their toolkit includes credential harvesting tools like Mimikatz, persistent remote access implants like RuRat, and modular .NET implants such as MucorAgent. The use of Hyper-V to host a Linux VM for malware execution represents a novel evasion technique that complicates detection and response efforts. This attack vector does not rely on known exploits but leverages legitimate Windows features, increasing its stealth and persistence. The threat actor’s ability to maintain a reverse proxy and continually introduce new tooling demonstrates a high level of operational sophistication and adaptability.
Potential Impact
For European organizations, especially those in Eastern Europe and countries with significant geopolitical interest, this threat poses a substantial risk to confidentiality, integrity, and availability. The use of Hyper-V virtualization to hide malicious activity allows attackers to bypass host-based security controls, making detection and remediation more challenging. Sensitive data could be exfiltrated stealthily, and persistent remote access could enable long-term espionage or sabotage. Organizations relying on Windows 10 with Hyper-V enabled, particularly in sectors such as government, critical infrastructure, defense, and energy, are at heightened risk. The stealthy nature of the attack complicates incident response and forensic investigations, potentially allowing attackers to maintain footholds for extended periods. The modular and adaptable malware toolkit increases the likelihood of tailored attacks and lateral movement within networks. The threat also underscores the risk of legitimate system features being abused for malicious purposes, necessitating a reevaluation of virtualization usage policies and monitoring.
Mitigation Recommendations
1. Implement strict controls and monitoring over the activation and use of Hyper-V roles on endpoints, limiting it only to authorized systems and users. 2. Deploy advanced behavioral analytics and network traffic inspection capable of detecting unusual VM creation, especially lightweight Linux VMs on Windows hosts. 3. Monitor for anomalous HTTP GET and POST traffic patterns indicative of encrypted command-and-control communications, particularly from unexpected processes or VMs. 4. Employ endpoint detection tools that can monitor virtualization layers and guest VMs, not just the host OS processes. 5. Conduct regular audits of installed Windows features and roles to identify unauthorized Hyper-V activation. 6. Harden PowerShell usage policies and monitor for suspicious scripts that could facilitate remote command execution. 7. Use network segmentation and strict proxy controls to limit unauthorized tunneling and proxying tools like Resocks, Ligolo-ng, and SSH tunnels. 8. Enhance credential protection measures to mitigate risks from tools like Mimikatz, including enforcing multi-factor authentication and privileged access management. 9. Collaborate with national CERTs and threat intelligence providers to stay updated on Curly COMrades’ tactics and indicators of compromise. 10. Educate security teams on the risks of virtualization-based evasion techniques and incorporate VM-level monitoring into security operations.
Affected Countries
Georgia, Moldova, Romania, Ukraine, Poland, Germany, France, United Kingdom
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
Description
The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. "This hidden environment, with its lightweight
AI-Powered Analysis
Technical Analysis
Curly COMrades is a sophisticated threat actor group that has been observed weaponizing Windows Hyper-V virtualization technology to conceal malicious activities within a minimal Alpine Linux virtual machine (VM) deployed on compromised Windows 10 systems. By enabling the Hyper-V role on victim machines, the attackers create a hidden execution environment that hosts custom malware such as CurlyShell—a C++-based ELF binary providing a persistent reverse shell—and CurlCat, a reverse proxy tool. This VM-based approach allows the threat actors to isolate their malware from the host OS, effectively evading detection by traditional endpoint detection and response (EDR) solutions that monitor host-level processes and behaviors. The VM is lightweight, consuming only about 120MB of disk space and 256MB of memory, making it difficult to detect through resource monitoring. Communication with the command-and-control (C2) infrastructure is conducted via encrypted HTTP GET and POST requests, enabling the execution of encrypted commands and exfiltration of data. The group also employs a variety of proxy and tunneling tools such as Resocks, Rsockstun, Ligolo-ng, CCProxy, Stunnel, and SSH-based methods to maintain covert and resilient communication channels. Curly COMrades have been active since late 2023, with documented attacks primarily targeting Georgia and Moldova, aligning with Russian geopolitical interests. Their toolkit includes credential harvesting tools like Mimikatz, persistent remote access implants like RuRat, and modular .NET implants such as MucorAgent. The use of Hyper-V to host a Linux VM for malware execution represents a novel evasion technique that complicates detection and response efforts. This attack vector does not rely on known exploits but leverages legitimate Windows features, increasing its stealth and persistence. The threat actor’s ability to maintain a reverse proxy and continually introduce new tooling demonstrates a high level of operational sophistication and adaptability.
Potential Impact
For European organizations, especially those in Eastern Europe and countries with significant geopolitical interest, this threat poses a substantial risk to confidentiality, integrity, and availability. The use of Hyper-V virtualization to hide malicious activity allows attackers to bypass host-based security controls, making detection and remediation more challenging. Sensitive data could be exfiltrated stealthily, and persistent remote access could enable long-term espionage or sabotage. Organizations relying on Windows 10 with Hyper-V enabled, particularly in sectors such as government, critical infrastructure, defense, and energy, are at heightened risk. The stealthy nature of the attack complicates incident response and forensic investigations, potentially allowing attackers to maintain footholds for extended periods. The modular and adaptable malware toolkit increases the likelihood of tailored attacks and lateral movement within networks. The threat also underscores the risk of legitimate system features being abused for malicious purposes, necessitating a reevaluation of virtualization usage policies and monitoring.
Mitigation Recommendations
1. Implement strict controls and monitoring over the activation and use of Hyper-V roles on endpoints, limiting it only to authorized systems and users. 2. Deploy advanced behavioral analytics and network traffic inspection capable of detecting unusual VM creation, especially lightweight Linux VMs on Windows hosts. 3. Monitor for anomalous HTTP GET and POST traffic patterns indicative of encrypted command-and-control communications, particularly from unexpected processes or VMs. 4. Employ endpoint detection tools that can monitor virtualization layers and guest VMs, not just the host OS processes. 5. Conduct regular audits of installed Windows features and roles to identify unauthorized Hyper-V activation. 6. Harden PowerShell usage policies and monitor for suspicious scripts that could facilitate remote command execution. 7. Use network segmentation and strict proxy controls to limit unauthorized tunneling and proxying tools like Resocks, Ligolo-ng, and SSH tunnels. 8. Enhance credential protection measures to mitigate risks from tools like Mimikatz, including enforcing multi-factor authentication and privileged access management. 9. Collaborate with national CERTs and threat intelligence providers to stay updated on Curly COMrades’ tactics and indicators of compromise. 10. Educate security teams on the risks of virtualization-based evasion techniques and incorporate VM-level monitoring into security operations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html","fetched":true,"fetchedAt":"2025-11-06T07:41:41.192Z","wordCount":1018}
Threat ID: 690c513803d96811746f64b5
Added to database: 11/6/2025, 7:41:44 AM
Last enriched: 11/6/2025, 7:42:01 AM
Last updated: 11/6/2025, 1:47:56 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Cavalry Werewolf Hackers Hit Russian Government Organization with New ShellNET Backdoor
MediumBinary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
MediumThreatFox IOCs for 2025-11-05
MediumMalware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
MediumNorton Researchers Crack Midnight Ransomware, Release Free Decryptor
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.