Cyber-Espionage Group Uses Hyper-V for Stealthy Attacks

Cyber Security News by CyberSum.net
5 sources
A cyber-espionage group known as Curly COMrades has been leveraging Microsoft Hyper-V virtualization to establish stealthy, persistent access within compromised networks. The group uses this technique to bypass standard endpoint detection and response (EDR) solutions. The operation, which began in July 2025, involves deploying a lightweight Alpine Linux virtual machine that serves as a covert command-and-control (C2) hub. The attackers use custom malware families, CurlyShell and CurlCat, for persistence and remote control. PowerShell scripts are also employed to maintain persistence and lateral movement.