Hackers Use Linux Malware to Evade Windows Security

07 Nov 2025

Hackers have increasingly utilized Linux malware to bypass Windows security, causing significant challenges for endpoint detection and response (EDR) systems.

Exploit Details and Tools

Bitdefender and Georgia CERT uncovered a Russian hacker group, Curly COMrades, exploiting Hyper-V on Windows 10. They used lightweight Alpine Linux VMs to evade detection, employing tools like Resocks, Ligolo-ng, and SSH-based methods for persistence and proxying. The attack began in July 2024 with DISM commands and disabled management interfaces to conceal remote VM operations.

Impact on Security Practices

This campaign emphasizes the need for enhanced EDR with host-based network monitoring to identify C2 traffic from VMs. Security measures must evolve to detect such Linux-based threats on Windows platforms, as these tactics are becoming more prevalent.

Advanced Techniques Used

CurlyShell and CurlCat, two custom programs, were deployed: CurlyShell acts as a reverse shell, and CurlCat manages traffic tunnels, profoundly impacting remote access capabilities. The threat actors also leveraged default network adapters and Hyper-V's internal NAT, masking malicious traffic as legitimate host traffic to bypass security systems.

Top charts for Desktop Windows

uTorrent

uTorrent

Latest update uTorrent download for free for Windows PC or Android mobile

5
1032 reviews
7508624
downloads
Zona

Zona

Latest update Zona download for free for Windows PC or Android mobile

4
614 reviews
1735674
downloads
WinRAR

WinRAR

Streamline file management with fast compression, secure your documents, and save space.

5
735 reviews
746785
downloads
Minecraft

Minecraft

Shape environments, explore vast worlds, and survive against monsters with endless creativity.

5
750 reviews
497010
downloads

Comments (0)

No comments yet. Be the first to comment!