Russian spies pack custom malware into hidden VMs on Windows
Briefly

Russian spies pack custom malware into hidden VMs on Windows
"This hidden environment, with its lightweight footprint (only 120MB disk space and 256MB memory), hosted their custom reverse shell, CurlyShell, and a reverse proxy, CurlCat,"
"By isolating the malware and its execution environment within a VM, the attackers effectively bypassed many traditional host-based EDR detections,"
Curly COMrades abused Microsoft's Hyper-V hypervisor on compromised Windows machines to create hidden Alpine Linux virtual machines that evade endpoint detection and response tools. The hidden VM had a small footprint (only 120MB disk space and 256MB memory) and hosted a custom reverse shell, CurlyShell, and a reverse proxy, CurlCat. Attackers remotely enabled the microsoft-hyper-v feature on at least two hosts while disabling the management interface, then downloaded the lightweight VM. The VM used Hyper-V's Default Switch so malicious outbound traffic traversed the host network stack, helping bypass host-based EDR detections. The group supports Russian geopolitical interests but has not been explicitly linked to the Russian government.
Read at Theregister
Unable to calculate read time
[
|
]