Monday, April 28, 2025
Homecyber securityWater Gamayun Hackers Exploit MSC EvilTwin Zero-day Vulnerability to Hack Windows Machine

Water Gamayun Hackers Exploit MSC EvilTwin Zero-day Vulnerability to Hack Windows Machine

Published on

SIEM as a Service

Follow Us on Google News

Water Gamayun, a suspected Russian threat actor, has been identified exploiting the MSC EvilTwin zero-day vulnerability (CVE-2025-26633) to compromise Windows systems.

This vulnerability, embedded in the Microsoft Management Console (MSC) framework, allows attackers to execute malicious code remotely, exfiltrate sensitive data, and maintain persistent control over infected machines.

The exploit leverages custom payloads and advanced techniques, posing significant risks to organizations globally.

- Advertisement - Google News

Delivery Methods and Payload Arsenal

The attackers employ various delivery methods, including provisioning packages (.ppkg), signed Microsoft Installer files (.msi), and specially crafted MSC files.

A notable technique involves using IntelliJ’s runnerw.exe to proxy PowerShell command execution on compromised systems.

Once deployed, payloads such as SilentPrism and DarkWisp backdoors ensure persistence and facilitate data theft.

Water Gamayun Hackers
DarkWisp execution flow

These malware strains communicate with command-and-control (C&C) servers via encrypted channels, employing anti-analysis techniques like virtual machine detection and randomized sleep intervals to evade detection.

The MSC EvilTwin loader is particularly noteworthy for its ability to mimic legitimate system paths by creating directories like C:\Windows \System32<space>\ and C:\Windows<space>\System32\en-US.

It deploys decoy and malicious MSC files dynamically linked to URLs hosting PowerShell commands.

After execution, the loader cleans up traces to minimize forensic evidence.

Malware Variants and Data Theft

Water Gamayun’s arsenal includes EncryptHub Stealer variants, Rhadamanthys Stealer, and other information-stealing malware.

Water Gamayun Hackers
EncryptHub Github repository

According to the Report, these tools extract sensitive data such as credentials, session histories, cryptocurrency wallets, and clipboard content from infected systems.

The collected data is compressed into ZIP archives and transmitted to attacker-controlled servers through encrypted channels.

SilentPrism backdoor achieves persistence by creating auto-run entries or scheduled tasks based on user privileges.

DarkWisp backdoor further enhances reconnaissance capabilities by gathering extensive system details, including antivirus status, VPN presence, and geographic location.

Both backdoors utilize dual-channel communication strategies for reliable command execution results delivery.

The exploitation of CVE-2025-26633 highlights the evolving sophistication of cyber threats targeting enterprise environments.

Organizations are urged to adopt proactive security measures such as advanced threat detection technologies and timely patch management to mitigate risks posed by actors like Water Gamayun.

Trend Micro has developed protections against this vulnerability through its Trend Vision One platform, which offers centralized cyber risk management and AI-powered threat detection capabilities.

By leveraging these tools, businesses can reduce ransomware risks by 92% and detection times by 99%, ensuring robust defense against emerging threats.

As the campaign remains under active development, cybersecurity teams must remain vigilant in monitoring indicators of compromise (IOCs) linked to Water Gamayun’s operations while implementing layered security strategies to safeguard their digital assets.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...