Threat Actors weaponize Linux VMs in Hyper-V to Bypass EDR
1. Introduction Bitdefender's recent discovery and analysis of a threat actor, designated Curly COMrades , reveals a sophisticated campaign employing virtualization technologies to circumvent endpoint detection and response (EDR) solutions and facilitate the execution of custom malware. This novel approach underscores the evolving landscape of advanced persistent threats (APTs) and the increasing need for comprehensive security strategies capable of detecting and mitigating attacks leveraging virtualization-based evasion techniques. The strategic use of lightweight, ephemeral virtual machines (VMs) represents a significant operational security (OPSEC) improvement for the threat actor, complicating forensic analysis and hindering attribution efforts. 2. Activity Overview The primary target and/or motivation of Curly COMrades appears to be aligned with state-sponsored espionage, primarily impacting entities within Georgia and Moldova . Assessed to be active since late 2023, observ...