In the ever-evolving cat-and-mouse game of cybersecurity, a sophisticated new tactic has emerged from Russian state-aligned hackers. Dubbed ‘Curly COMrades’ by researchers, this group is exploiting Microsoft’s Hyper-V virtualization technology to embed hidden Linux virtual machines within compromised Windows systems. This method allows them to run custom malware undetected, bypassing traditional endpoint detection and response (EDR) tools.
The technique involves creating a lightweight Alpine Linux VM that operates invisibly alongside the host Windows environment. Inside this VM, the hackers deploy tools like CurlyShell, a custom reverse shell, and CurlCat, a reverse proxy, enabling persistent access for espionage and further attacks. This discovery, detailed in a report by Bitdefender, highlights a growing trend of abusing legitimate system features for malicious purposes.
The Mechanics of the Hyper-V Exploit
According to TechRadar, the attack begins with initial compromise of Windows machines, often through vulnerabilities or social engineering. Once inside, attackers enable Hyper-V—a built-in Windows feature typically used for running virtual machines—and configure it to host an Alpine Linux VM. This VM is stripped down to a mere 120MB of disk space and 256MB of memory, making it resource-efficient and hard to detect.
Bitdefender’s senior security researcher Victor Vrabie explained in the report: ‘By isolating the malware and its execution environment within a VM, the attackers effectively create a parallel world that’s invisible to most security solutions on the host.’ This isolation prevents EDR tools from monitoring the VM’s activities, as they focus on the host OS.
Custom Malware Arsenal Unveiled
The custom tools within the VM are particularly insidious. CurlyShell provides a reverse shell for command execution, while CurlCat acts as a proxy to tunnel traffic, masking communications with command-and-control servers. BleepingComputer reports that this setup allows long-term network access for snooping and deploying additional payloads.
Researchers from Bitdefender, collaborating with the Georgian Computer Emergency Response Team (CERT), uncovered this campaign targeting organizations in Europe and beyond. The VM’s lightweight nature ensures it doesn’t raise alarms through high resource usage, and its hidden status evades standard scans.
Broader Implications for Critical Infrastructure
This tactic aligns with Russia-aligned cyber activities, as noted by Dark Reading. The group, also known as Void Blizzard or LAUNDRY BEAR in some contexts, has been linked to espionage against government, defense, and healthcare sectors. Posts on X from cybersecurity accounts like Microsoft Threat Intelligence highlight ongoing Russian threats to global networks, including exploitation of old vulnerabilities.
Recent news from The Register emphasizes how this method gives spies ‘long-term network access to snoop and deploy malware.’ The use of legitimate tools like Hyper-V complicates detection, as security teams may overlook enabled virtualization features.
Evolution of Russian Cyber Tactics
Historical context from X posts by vx-underground reveals Russia’s complex relationship with its hackers, sometimes arresting those targeting NATO countries while tolerating state-aligned operations. This latest innovation builds on previous exploits, such as abusing Windows flaws like CVE-2025-26633 for malware delivery, as reported by The Hacker News on X.
Cybernews describes the ‘sneaky innovation’ of running malware in a parallel VM, enabling undetected operations. The Alpine Linux choice is strategic—its minimalism reduces footprints, and its open-source nature allows easy customization.
Defensive Strategies and Industry Response
To counter this, experts recommend monitoring for unexpected Hyper-V activations and unusual VM creations. Bitdefender advises implementing behavioral analysis that extends to virtual environments. Techzine Global notes that Curly COMrades uses these VMs to evade detection entirely.
Industry insiders are calling for enhanced virtualization security. As per recent X posts from TechPulse Daily and TechRadar, this attack hides traffic and bypasses protections, underscoring the need for layered defenses including network monitoring and anomaly detection.
Global Reach and Attribution Challenges
Attribution points to Russian intelligence, with overlaps to groups like Berserk Bear targeting U.S. infrastructure, as warned by the FBI in X posts from GeoInsider. The campaign’s scope includes Europe, North America, and possibly Ukraine, tying into geopolitical tensions.
H2S Media explains how the VM runs stealthily, invisible to Windows EDR and antivirus. This cross-OS blending—Linux malware on Windows—represents a hybrid threat requiring cross-platform security expertise.
Future Threats and Mitigation Horizons
Looking ahead, cybersecurity predictions from X user Dr. Khulood Almani foresee quantum threats and AI shifts in 2025, but virtualization abuse could persist. Organizations must audit Hyper-V usage and employ tools that inspect VM contents.
Collaboration between entities like Bitdefender and CERT-Georgia is crucial. As Vrabie stated, this ‘hidden environment’ exemplifies how attackers leverage legitimate tech, urging a reevaluation of trust in built-in features.
Lessons from the Frontlines
Real-world incidents, such as those targeting Ukrainian organizations via 7-Zip vulnerabilities (CVE-2025-0411) posted by The Hacker News on X, show the breadth of Russian tactics. This VM method adds a layer of persistence, making eradication challenging.
In response, Microsoft may enhance Hyper-V monitoring in future updates. Meanwhile, security firms are updating signatures to detect CurlyShell and CurlCat indicators.
Navigating the Virtual Battlefield
The convergence of virtualization and malware poses ongoing risks to critical sectors. Posts on X from Infosec Alevski and others amplify awareness, stressing proactive measures.
Ultimately, this exploit underscores the ingenuity of state actors, pushing the industry toward more resilient architectures.


WebProNews is an iEntry Publication