Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

X taps William Shatner to distribute an invitation to his payment service X Money

Father sues Google, claiming Gemini chatbot drove son into deadly delusions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian hackers exploit CVE-2025-26633 via MSC Eviltwin to deploy SilentPrism and DarkWisp
Identity

Russian hackers exploit CVE-2025-26633 via MSC Eviltwin to deploy SilentPrism and DarkWisp

userBy userMarch 31, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

SilentPrism and DarkWisp

Threat actors behind the zero-day exploitation of recently patched security vulnerabilities in Microsoft Windows have been found to offer two new backdoors called SilentPrism and DarkWisp.

This activity stems from a suspected group of Russian hacking groups called Water Gamayun, also known as Encrypthub and Larva-208.

“Threat Actor deploys the payload primarily using malicious provisioning packages, signed .MSI files, and Windows MSC files, and command execution techniques such as Intellij runnerw.exe, Trend Micro researchers Aliakbar Zahravi and Ahmed Mohamed Ibrahim said in a follow-up analysis published last week.

Water Gamayun is linked to the aggressive exploitation of CVE-2025-26633 (aka MSC Eviltwin), a vulnerability in the Microsoft Management Console (MMC) framework, to run malware using Rogue Microsoft Console (.MSC) files.

The attack chain includes the use of provisioning packages (.ppkg), signed Microsoft Windows installer files (.msi), and .msc files, delivering information stealers and backdoors that are persistent and data theft.

Cybersecurity

Ancrypthub attracted attention towards the end of June 2024 after using a Github repository named “Encrypthub” to push different kinds of malware families, including steelers, miners, ransomware and more via fake Winrar websites. Threat actors have since moved to infrastructure for both staging and command and control (C&C).

The .msi installer used in attacks is equipped with legal messaging and conferencing software such as Dingtalk, qqtalk, and Voov Meeting. They are designed to run the PowerShell downloader and are then used to retrieve and run the next stage payload on the compromised host.

SilentPrism and DarkWisp

One such malware is a PowerShell implant called SilentPrism, which can set up persistence, execute multiple shell commands simultaneously, and maintain remote control. Another Powershell backdoor is DarkWisp, which allows for system reconnaissance, removal of sensitive data, and persistence.

“When malware removes reconnaissance and system information into a C&C server, it enters a continuous loop waiting for commands,” the researchers said. “The malware accepts commands over a TCP connection on port 8080. Here the commands arrive at the format command |.”

“The main communication loop ensures continuous interaction with the server, processing commands, maintaining connections, and secure transmission of results.”

The third payload dropped in the attack is the MSC Eviltwin loader that weaponizes CVE-2025-26633 to run malicious .MSC files. The loader is designed to perform a system cleanup so that it does not leave the forensic trail.

CVE-2025-26633

Rhadamanthys is far from the only stolen item in Water Gamayun’s arsenal. It has been observed that they are delivering another commodity steeler called Stealc and three custom PowerShell variants called Encrypthub Stealer variant A, Variant B, and Variant C.

Custom Steelers are fully functional malware that can collect a wide range of system information, including details such as antivirus software, installed software, network adapters, running applications, and more. It also extracts session data from Wi-Fi passwords, Windows product keys, clipboard history, browser credentials, and various apps related to messaging, VPN, FTP, and password management.

Additionally, it focuses on collecting recovery phrases related to cryptocurrency wallets, specifically single-outing files that match specific keywords and extensions.

“These variants exhibit similar functions and capabilities, and only have minor modifications that distinguish them,” the researchers noted. “All enliptob variants covered in this study are modified versions of the open source Kemathia Stealer.”

One iteration of Encrypthub Stealer is worth noting that Intellij Process Launcher “Runnerw.exe” uses the new Living Off Binary (LOLBIN) technology, which is used to proxy the execution of remote PowerShell scripts on infected systems.

Cybersecurity

Steeler artifacts distributed through malicious MSI packages or binary malware droppers have also been found to propagate other malware families such as Lumma Stealer, Amadey, and Clippers.

Further analysis of the C&C infrastructure of threat actors (“82.115.223[.]182”) revealed the ability to use other PowerShell scripts to download and run AnyDesk software for remote access and send Base64-encoded remote commands to the victim machine.

“Water Gamayun uses a variety of delivery methods and techniques in its campaigns, including provisioning malicious payloads via signed Microsoft installer files and leveraging Lolbins, highlighting adaptability in victims’ system and data breach,” Trend Micro said.

“The intricately designed payload and C&C infrastructure allow threat actors to remain persistent, dynamically control infected systems and obfuscate activity.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFaced with measles, Texas health workers stand up to the “information war” | Health News
Next Article Trump’s “America First” policy complicates the business of making cars | Business and economy news
user
  • Website

Related Posts

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

March 4, 2026

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

March 4, 2026

New RFP template for AI usage control and AI governance

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

X taps William Shatner to distribute an invitation to his payment service X Money

Father sues Google, claiming Gemini chatbot drove son into deadly delusions

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.