How Do Curly COMrades Hackers Hide in Windows 10 Systems?

Article Highlights
Off On

In an alarming development within the cybersecurity landscape, a sophisticated threat actor group known as Curly Comrades has emerged with groundbreaking tactics to infiltrate and persist within Windows 10 environments, posing significant challenges to traditional security measures. This group has demonstrated an uncanny ability to exploit legitimate system features, turning them into tools for covert operations that evade even the most advanced endpoint detection and response solutions. By leveraging virtualization technology, these hackers create hidden enclaves on compromised machines, allowing them to conduct malicious activities under the radar. The campaign, which surfaced in recent months, underscores a worrying trend where adversaries continuously adapt to bypass defensive mechanisms. This article delves into the intricate methods employed by Curly Comrades, exploring how they manipulate Windows 10 features for stealthy persistence and what this means for cybersecurity professionals tasked with safeguarding critical networks against such evolving threats.

1. Exploiting Virtualization for Covert Access

The core of Curly Comrades’ strategy revolves around the abuse of Hyper-V, a legitimate virtualization feature native to Windows 10, to establish a concealed operational base within targeted systems. By enabling the Hyper-V role on compromised machines, the attackers deploy a minimalistic virtual machine based on Alpine Linux, which serves as a secluded environment for hosting malicious tools. This virtual setup, requiring just 120MB of disk space and 256MB of memory, is deliberately lightweight to avoid raising suspicion. The attackers disable the Hyper-V management interface to further reduce visibility, ensuring that their activities remain hidden from standard monitoring tools. This approach not only isolates their malware from the host system’s security mechanisms but also complicates detection efforts, as the malicious traffic is routed through the host’s network stack, appearing to originate from legitimate sources. Such innovative use of virtualization highlights the growing sophistication of threat actors in exploiting built-in system functionalities for nefarious purposes.

Beyond the initial setup, Curly Comrades employs custom implants within the virtual machine to maintain long-term access and control over the compromised environment. Two notable tools, CurlyShell and CurlCat, play pivotal roles in their operations. CurlyShell functions as a persistent reverse shell, establishing secure HTTPS communication with the group’s command and control infrastructure, while CurlCat operates as a reverse proxy tool for on-demand SSH tunneling. These implants are executed through automated tasks within the virtual machine, ensuring continuous operation without direct interaction from the host system. The configuration of the virtual machine also utilizes Hyper-V’s Default Switch network adapter with Network Address Translation, masking the origin of outbound malicious traffic. This tactic significantly hinders attribution efforts by blending illicit communications with legitimate network activity, demonstrating a high level of technical expertise and meticulous planning in evading traditional security defenses.

2. Deployment Tactics and Persistence Mechanisms

Curly Comrades’ deployment strategy begins with a series of carefully crafted steps designed to blend their malicious activities with legitimate system processes on Windows 10 machines. The attack sequence starts with enabling Hyper-V virtualization while simultaneously disabling its management interface to minimize visibility to system administrators and security tools. Following this, a deceptive payload is delivered through a RAR archive disguised as a video file, which is extracted to a directory mimicking legitimate Microsoft application paths. Using PowerShell commands, the attackers import and start the virtual machine, naming it “WSL” to suggest it is part of the Windows Subsystem for Linux—a commonly trusted developer tool. This naming convention is a deliberate deception tactic to avoid scrutiny. Such methods showcase how the group exploits user trust in familiar system components, making it challenging for security teams to identify anomalies amidst routine system operations.

Persistence is another critical aspect of Curly Comrades’ methodology, ensuring their foothold remains intact even after system reboots or security scans. Within the virtual machine, persistence is achieved through a root-level crontab entry that triggers every four hours, executing a script to launch the CurlyShell implant. This reverse shell maintains continuous communication with external servers, allowing the attackers to issue commands and exfiltrate data at will. Additionally, the group employs various proxy and tunneling tools like Resocks and Ligolo-ng to create flexible access channels, further solidifying their control over the compromised environment. The use of multiple persistence mechanisms, including PowerShell scripts and Kerberos ticket manipulation for lateral movement, reflects a comprehensive approach to maintaining access. This multi-layered strategy underscores the difficulty in eradicating such threats, as each component is designed to operate independently, ensuring resilience against mitigation attempts by cybersecurity defenders.

3. Implications for Cybersecurity Defenses

The emergence of Curly Comrades’ tactics signals a pressing need for cybersecurity frameworks to evolve in response to adversaries who exploit legitimate system features like Hyper-V on Windows 10. Traditional host-based security monitoring often fails to detect activities within isolated virtual environments, as demonstrated by this group’s ability to route malicious traffic through the host’s network stack, masking it as legitimate communication. This gap in visibility poses a significant challenge for endpoint detection and response solutions, which are typically designed to monitor host-level activities rather than virtualized instances. As threat actors continue to innovate, security teams must prioritize developing detection mechanisms that account for virtualization-based attacks. This includes monitoring for unusual Hyper-V configurations or unexpected virtual machine deployments, which could indicate malicious intent lurking beneath the surface of seemingly benign system operations.

Furthermore, the sophistication of Curly Comrades’ toolkit, including custom implants and advanced tunneling tools, necessitates a proactive approach to threat hunting and incident response. Security professionals should focus on analyzing network traffic patterns for signs of reverse shells or proxy communications that deviate from normal behavior. Collaboration with industry peers and national CERTs, as seen in the joint investigation with Georgian CERT that uncovered this campaign, is also vital for sharing intelligence on emerging threats. Implementing strict access controls and monitoring for unauthorized changes to Group Policy or local account creation can help mitigate risks of lateral movement. As attackers refine their methods, adopting a layered defense strategy that combines behavioral analysis, anomaly detection, and regular system audits becomes essential. These measures, while resource-intensive, are crucial for staying ahead of adversaries who continuously adapt to exploit the latest technological advancements in their pursuit of unauthorized access.

Final Thoughts on Strengthening Defenses

Looking back at the intricate campaign waged by Curly Comrades, it becomes evident that their ability to hide within Windows 10 systems using virtualization demands a reevaluation of existing security postures. The meticulous planning and technical prowess displayed in exploiting Hyper-V and deploying custom malware underscore a critical vulnerability in conventional defenses. Moving forward, organizations need to invest in advanced monitoring tools capable of scrutinizing virtual environments for suspicious activities. Updating incident response plans to include virtualization-specific checks proves necessary to address such stealthy intrusions. Additionally, fostering a culture of continuous learning among cybersecurity teams ensures they remain abreast of evolving tactics like those employed by this group. By integrating these strategies, defenders can better anticipate and neutralize future threats, transforming past challenges into actionable insights for safeguarding networks against increasingly sophisticated adversaries.

Explore more

How AI Agents Work: Types, Uses, Vendors, and Future

From Scripted Bots to Autonomous Coworkers: Why AI Agents Matter Now Everyday workflows are quietly shifting from predictable point-and-click forms into fluid conversations with software that listens, reasons, and takes action across tools without being micromanaged at every step. The momentum behind this change did not arise overnight; organizations spent years automating tasks inside rigid templates only to find that

AI Coding Agents – Review

A Surge Meets Old Lessons Executives promised dazzling efficiency and cost savings by letting AI write most of the code while humans merely supervise, but the past months told a sharper story about speed without discipline turning routine mistakes into outages, leaks, and public postmortems that no board wants to read. Enthusiasm did not vanish; it matured. The technology accelerated

Open Loop Transit Payments – Review

A Fare Without Friction Millions of riders today expect to tap a bank card or phone at a gate, glide through in under half a second, and trust that the system will sort out the best fare later without standing in line for a special card. That expectation sits at the heart of Mastercard’s enhanced open-loop transit solution, which replaces

OVHcloud Unveils 3-AZ Berlin Region for Sovereign EU Cloud

A Launch That Raised The Stakes Under the TV tower’s gaze, a new cloud region stitched across Berlin quietly went live with three availability zones spaced by dozens of kilometers, each with its own power, cooling, and networking, and it recalibrated how European institutions plan for resilience and control. The design read like a utility blueprint rather than a tech

Can the Energy Transition Keep Pace With the AI Boom?

Introduction Power bills are rising even as cleaner energy gains ground because AI’s electricity hunger is rewriting the grid’s playbook and compressing timelines once thought generous. The collision of surging digital demand, sharpened corporate strategy, and evolving policy has turned the energy transition from a marathon into a series of sprints. Data centers, crypto mines, and electrifying freight now press