Russian hackers hit Windows machines via Linux VMs with new custom malware
Hiding malware in VMs bypasses security protections
- Curly COMrades deployed Alpine Linux VMs on Windows hosts to hide reverse-shell malware activity
- VM traffic tunneled via host IP, bypassing traditional EDR and masking outbound communications
- Targets included Georgian and Moldovan institutions; operations align with Russian geopolitical interests
Russian hackers known as Curly COMrades have been seen hiding their malware in Linux-based virtual machines (VM) deployed on Windows devices, experts have warned.
Security researchers from Bitdefender after analyzing the latest activities together with the Georgian Computer Emergency Response Team (CERT), found Curly COMrades first started targeting their victims in July 2025, when they ran remote commands to enable the microsoft-hyper-v virtualization feature and disable its management interface.
Then, they used the feature to download a lightweight Alpine Linux-based VM containing multiple malware implants.
Russian attackers
The malware deployed in this campaign is called CurlyShell and CurlCat, both of which provide a reverse shell. The hackers also deployed PowerShell scripts which granted remote authentication and arbitrary command execution capabilities.
To hide the activity in plain sight, they configured the VM to use the Default Switch network adapter in Hyper-V. That way, all of the VM’s traffic went through the host’s network stack using Hyper-V’s internal network.
"In effect, all malicious outbound communication appears to originate from the legitimate host machine's IP address," the researchers explained. "By isolating the malware and its execution environment within a VM, the attackers effectively bypassed many traditional host-based EDR detections."
Curly COMrades were first spotted in 2024 and while their activities align with the interests of the Russian Federation, a direct link was not found. In August 2025, Bitdefender reported that their victims included government and judicial organizations in Georgia, and energy companies in Moldova. The victims in this incident were not named.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Bitdefender stressed that there are no strong overlaps with known Russian APT groups, but Curly COMrades’ operations “align with the geopolitical goals of the Russian Federation."
Ever since Russia’s attention turned towards Ukraine in 2014 with the annexation of Crimea, countries on its eastern border have lost the spotlight. Georgia, however, is in a similar position to Ukraine, with two regions declaring independence with the help of the Russian military - South Ossetia, and Abkhazia. Therefore, it would make sense that Russia’s cyberspies would like to keep tabs on neighboring countries and their diplomatic efforts.
Via The Register

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mobile:
McAfee Mobile Security
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.