A New Era of VM-Powered Cyber Attacks
The Curly COMrades threat group exploited Hyper-V virtualization on compromised Windows systems to evade endpoint detection. Attackers enabled Hyper-V, deployed a minimal Linux VM (120 MB disk, 256 MB RAM), and ran custom tools including CurlyShell reverse shell and CurlCat proxy inside the VM. This technique bypassed host-based EDR and AV solutions that don't inspect nested virtual environments. Active since late 2023 and documented in August 2025, the campaign targeted Georgia and Moldova. Defenders should monitor for unusual VM creation and Hyper-V role enablement on endpoints.