Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

2 How Uc Berkeley Dropout raised $28 million for AI Marketing Automation Startup

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian hackers exploit CVE-2025-26633 via MSC Eviltwin to deploy SilentPrism and DarkWisp
Identity

Russian hackers exploit CVE-2025-26633 via MSC Eviltwin to deploy SilentPrism and DarkWisp

userBy userMarch 31, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

SilentPrism and DarkWisp

Threat actors behind the zero-day exploitation of recently patched security vulnerabilities in Microsoft Windows have been found to offer two new backdoors called SilentPrism and DarkWisp.

This activity stems from a suspected group of Russian hacking groups called Water Gamayun, also known as Encrypthub and Larva-208.

“Threat Actor deploys the payload primarily using malicious provisioning packages, signed .MSI files, and Windows MSC files, and command execution techniques such as Intellij runnerw.exe, Trend Micro researchers Aliakbar Zahravi and Ahmed Mohamed Ibrahim said in a follow-up analysis published last week.

Water Gamayun is linked to the aggressive exploitation of CVE-2025-26633 (aka MSC Eviltwin), a vulnerability in the Microsoft Management Console (MMC) framework, to run malware using Rogue Microsoft Console (.MSC) files.

The attack chain includes the use of provisioning packages (.ppkg), signed Microsoft Windows installer files (.msi), and .msc files, delivering information stealers and backdoors that are persistent and data theft.

Cybersecurity

Ancrypthub attracted attention towards the end of June 2024 after using a Github repository named “Encrypthub” to push different kinds of malware families, including steelers, miners, ransomware and more via fake Winrar websites. Threat actors have since moved to infrastructure for both staging and command and control (C&C).

The .msi installer used in attacks is equipped with legal messaging and conferencing software such as Dingtalk, qqtalk, and Voov Meeting. They are designed to run the PowerShell downloader and are then used to retrieve and run the next stage payload on the compromised host.

SilentPrism and DarkWisp

One such malware is a PowerShell implant called SilentPrism, which can set up persistence, execute multiple shell commands simultaneously, and maintain remote control. Another Powershell backdoor is DarkWisp, which allows for system reconnaissance, removal of sensitive data, and persistence.

“When malware removes reconnaissance and system information into a C&C server, it enters a continuous loop waiting for commands,” the researchers said. “The malware accepts commands over a TCP connection on port 8080. Here the commands arrive at the format command |.”

“The main communication loop ensures continuous interaction with the server, processing commands, maintaining connections, and secure transmission of results.”

The third payload dropped in the attack is the MSC Eviltwin loader that weaponizes CVE-2025-26633 to run malicious .MSC files. The loader is designed to perform a system cleanup so that it does not leave the forensic trail.

CVE-2025-26633

Rhadamanthys is far from the only stolen item in Water Gamayun’s arsenal. It has been observed that they are delivering another commodity steeler called Stealc and three custom PowerShell variants called Encrypthub Stealer variant A, Variant B, and Variant C.

Custom Steelers are fully functional malware that can collect a wide range of system information, including details such as antivirus software, installed software, network adapters, running applications, and more. It also extracts session data from Wi-Fi passwords, Windows product keys, clipboard history, browser credentials, and various apps related to messaging, VPN, FTP, and password management.

Additionally, it focuses on collecting recovery phrases related to cryptocurrency wallets, specifically single-outing files that match specific keywords and extensions.

“These variants exhibit similar functions and capabilities, and only have minor modifications that distinguish them,” the researchers noted. “All enliptob variants covered in this study are modified versions of the open source Kemathia Stealer.”

One iteration of Encrypthub Stealer is worth noting that Intellij Process Launcher “Runnerw.exe” uses the new Living Off Binary (LOLBIN) technology, which is used to proxy the execution of remote PowerShell scripts on infected systems.

Cybersecurity

Steeler artifacts distributed through malicious MSI packages or binary malware droppers have also been found to propagate other malware families such as Lumma Stealer, Amadey, and Clippers.

Further analysis of the C&C infrastructure of threat actors (“82.115.223[.]182”) revealed the ability to use other PowerShell scripts to download and run AnyDesk software for remote access and send Base64-encoded remote commands to the victim machine.

“Water Gamayun uses a variety of delivery methods and techniques in its campaigns, including provisioning malicious payloads via signed Microsoft installer files and leveraging Lolbins, highlighting adaptability in victims’ system and data breach,” Trend Micro said.

“The intricately designed payload and C&C infrastructure allow threat actors to remain persistent, dynamically control infected systems and obfuscate activity.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFaced with measles, Texas health workers stand up to the “information war” | Health News
Next Article Trump’s “America First” policy complicates the business of making cars | Business and economy news
user
  • Website

Related Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

July 30, 2025

Funksec Ransomware Decryptor was published for free after the group was dormant

July 30, 2025

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

2 How Uc Berkeley Dropout raised $28 million for AI Marketing Automation Startup

Observation continues to adapt to a changing world of software observability

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.