Russian hackers are hitting Windows machines via Linux VMs with new custom malware


  • Curly COMrades deployed Alpine Linux VMs on Windows hosts to hide reverse-shell malware activity
  • VM traffic tunneled via host IP bypassing traditional EDR and masking outgoing communications
  • The targets included Georgian and Moldovan institutions; operations are aligned with Russian geopolitical interests

Russian hackers known as Curly COMrades have been seen hiding their malware in Linux-based virtual machines (VM) installed on Windows devices, experts have warned.

Security researchers from Bitdefender, after analyzing recent activities together with the Georgian Computer Emergency Response Team (CERT), found that Curly COMrades only started targeting their victims in July 2025, when they ran remote commands to enable the microsoft-hyper-v virtualization feature and disable its management interface.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top