
Who: Russian-linked EncryptHub (aka LARVA-208 / Water Gamayun)
What: Exploiting Windows MMC flaw CVE-2025-26633 (“MSC EvilTwin”) to deploy Fickle Stealer, an advanced PowerShell-based info stealer.
X (formerly Twitter)+11Cyber Security News+11Security Affairs+11
How they attack:
- Initiate contact via fake IT Microsoft Teams request.
- Victim accepts → attacker runs runner.ps1, exploiting EvilTwin — dropping dual .msc files (one genuine, one malicious) in MUIPath.
- Launch of legit .msc triggers execution of rogue one, activating C2 via AES‑encrypted PowerShell commands.
- Payloads include:
- Fickle Stealer: data exfiltration + crypto wallet theft.
- SilentCrystal (Golang loader via Brave Support).
- A Golang-based SOCKS5 backdoor and fake video conferencing lure (“RivaTalk”).
Western Illinois University+10Cyber Security News+10Security Affairs+10
Why it matters (CyberDudeBivash take):
- Attackers successfully blend social engineering + zero-day exploitation.
- Use of trusted internal tools and legitimate platforms (Teams, Elite MMC, Brave Support) makes detection extremely difficult.
- Fickle Stealer’s fake web traffic masking makes network detection even more elusive.
- Highlights the urgent need to defend not only endpoints—but tools, platforms, and trade protocols.
Defense by CyberDudeBivash:
- Patch now:Â Ensure CVE-2025-26633 is remediated across all Windows systems.
- Harden MMC paths:Â Whitelist-only execution, remove unexpected MUIPath entries.
- Team access hygiene:Â Disable unsanctioned remote requests; verify all internal prompt-based sessions.
- Endpoint analytics:Â Hunt for ducky-stealth behavior, AES-loaded PowerShell, and anomalous MMC-child process execution.
- Honeytoken deployment:Â Use decoyÂ
.msc files in MUIPaths to detect tampering or lateral movement early.
TL;DR: EncryptHub just demonstrated how lethal linkers—social engineering + EvilTwin vulnerability—can deliver stealer malware with surgical stealth. If your org hasn’t patched and closely scanned MMC executions, you’re already exposed.
For full, daily threat intel & battletested SOC defense guides, visit CyberDudeBivash — where we decode threats so defenders stay ahead.
#CyberDudeBivash #ThreatIntel #EncryptHub #MSC-EvilTwin #WindowsSecurity #Malware #Cybersecurity #SOCDefense
Leave a comment