The cyberespionage group Curly COMrades has leveraged Windows Hyper-V to execute stealthy malware operations. Researchers from Bitdefender have reported that this group deploys Linux-based virtual machines (VMs) on compromised Windows 10 systems to hide malicious activities.
Windows Hyper-V Exploitation
Curly COMrades use the Hyper-V role on victim systems to launch a lightweight Alpine Linux VM, which houses custom implants like CurlyShell and CurlCat. These implants, built with libcurl, facilitate malicious operations such as reverse shell access and SSH tunneling.
- Curly COMrades leverage Windows Hyper-V to deploy minimalistic 120 MB Alpine Linux VMs.
- The attackers use the DISM tool to enable Hyper-V while disabling its graphical interface.
- Pre-built Alpine Linux VM images are imported using PowerShell cmdlets.
Security Evasion Techniques
By isolating malware within VMs, the group effectively bypasses traditional host-based Endpoint Detection and Response (EDR) systems. This tactic allows them to execute commands covertly and evade detection more effectively. Bitdefender emphasizes the need for enhanced host-based network inspection strategies to counter such sophisticated threats. Organizations are advised to employ proactive hardening to reduce the risk of exploiting native system binaries.
Implications for Cyber Defense
This campaign signals a shift in threat tactics as adversaries seek new ways to circumvent increasingly robust EDR solutions. The use of virtual machines for malware operations highlights the necessity for defense-in-depth strategies. Organizations should strive to create environments that are inhospitable to attackers, incorporating multilayered defenses to bolster security measures.



