Russian Hackers Attack Windows Machines Through Linux Virtual Machines With New Custom Malware


  • Curly COMrades deployed Alpine Linux virtual machines on Windows hosts to hide reverse shell malware activity
  • VM traffic tunneled through host IP, bypassing traditional EDR and hiding outbound communications
  • Targets included Georgian and Moldovan institutions; operations align with Russian geopolitical interests

Russian hackers known as Curly COMrades have been seen hiding their malware in Linux-based virtual machines (VMs) deployed on Windows devices, experts have warned.

Bitdefender security researchers, after analyzing the latest activities in collaboration with the Georgian Computer Emergency Response Team (CERT), discovered that Curly COMrades started targeting its victims in July 2025, when they executed remote commands to activate the Microsoft-hyper-v virtualization feature and disable its management interface.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top