Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TechCrunch Disrupt Scene | TechCrunch

macOS’s new security layer targets admin errors before hackers

Navan IPO falls 20% after historic debut as SEC closure avoidance strategy

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian ransomware gang weaponizes open source AdaptixC2 for advanced attacks
Identity

Russian ransomware gang weaponizes open source AdaptixC2 for advanced attacks

userBy userOctober 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 30, 2025Ravi LakshmananMalware/Cybercrime

The open-source command and control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of which are associated with Russian ransomware gangs.

AdaptixC2 is an extensible post-exploitation and adversarial emulation framework designed for penetration testing. The server component is written in Golang, while the GUI client is written in C++ QT for cross-platform compatibility.

It comes with a wide range of features, including fully encrypted communications, command execution, a credential and screenshot manager, and a remote terminal. An earlier iteration was publicly released in August 2024 by a GitHub user named “RalfHacker” (@HackerRalf on X). This user describes himself as a penetration tester, red team operator, and “MalDev” (short for malware developer).

DFIR retainer service

In recent months, AdaptixC2 has been employed by various hacking groups, including threat actors associated with the Fog and Akira ransomware operations, as well as early access brokers that leveraged CountLoader in attacks aimed at providing a variety of post-exploitation tools.

Palo Alto Networks’ Unit 42, which analyzed the technical aspects of the framework last month, characterized it as a modular and versatile framework that can be used to “give comprehensive control over affected machines,” and as part of a fake help desk support phone scam via Microsoft Teams and PowerShell scripts generated with artificial intelligence (AI).

Although AdaptixC2 is presented as an ethical open source tool for red teaming, it has clearly attracted the attention of cybercriminals.

Cybersecurity firm Silent Push said RalfHacker’s GitHub profile as “MalDev” sparked an investigation that led to the discovery of several GitHub account email addresses linked to the account owner, as well as a Telegram channel called RalfHackerChannel, where messages posted to AdaptixC2’s dedicated channel were reshared. The RalfHackerChannel channel has over 28,000 subscribers.

CIS build kit

In a message on the AdaptixFramework channel in August 2024, they said they were interested in starting a project around “Public C2, which is very trendy right now,” and hoped to “be like Empire,” another popular post-exploitation and adversarial emulation framework.

While it is unclear at this stage whether RalfHacker is directly involved in malicious activity related to AdaptixC2 or CountLoader, Silent Push said their “connections to the Russian criminal underworld through their use of Telegram for marketing purposes and the subsequent increased use of the tool by Russian threat actors all raise significant red flags.”

Hacker News has reached out to RalfHacker for comment. I will update the article if I receive a response.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBevel raises $10M Series A from General Catalyst for AI health companion
Next Article Google’s AI defenses built into Android now block 10 billion fraudulent messages per month
user
  • Website

Related Posts

macOS’s new security layer targets admin errors before hackers

October 31, 2025

Google’s AI defenses built into Android now block 10 billion fraudulent messages per month

October 30, 2025

New ‘brazen’ exploit instantly crashes Chromium browser with a single malicious URL

October 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TechCrunch Disrupt Scene | TechCrunch

macOS’s new security layer targets admin errors before hackers

Navan IPO falls 20% after historic debut as SEC closure avoidance strategy

Canva launches unique design model, adds new AI capabilities to platform

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.