Open-source AdaptixC2 hacking tool has fans in Russian cybercrime underground
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要理解文章的内容。文章讲的是俄罗斯相关的网络犯罪分子滥用了一个渗透测试工具AdaptixC2,用于勒索软件攻击。这个工具原本是用于合法的安全测试,但现在被恶意利用了。 接下来,我注意到文章提到研究人员追踪到一个叫RalfHacker的人,他可能在推广和使用这个工具,并且通过俄语Telegram频道进行活动。这表明可能存在与俄罗斯犯罪网络的联系,但目前还没有确凿证据证明他直接参与犯罪。 还有,AdaptixC2在GitHub上是开源免费的,被宣传为安全专业人士的工具,但被滥用的情况越来越多。这说明开源工具容易被犯罪分子利用。 最后,用户希望总结控制在100字以内,并且直接描述内容。所以我要抓住关键点:俄罗斯网络犯罪分子滥用AdaptixC2进行勒索攻击,该工具由RalfHacker推广,并且可能与俄罗斯犯罪网络有关。 现在把这些信息浓缩成一句话:俄罗斯相关网络犯罪分子利用渗透测试工具AdaptixC2进行勒索软件攻击,该工具由RalfHacker推广,并与俄罗斯犯罪网络有关。 </think> 俄罗斯相关网络犯罪分子利用渗透测试工具AdaptixC2进行勒索软件攻击。该工具由RalfHacker推广,并与俄罗斯犯罪网络有关。 2025-10-30 16:31:31 Author: therecord.media(查看原文) 阅读量:2 收藏

Russia-linked cybercriminals are reportedly abusing a popular penetration-testing tool in ransomware campaigns around the world, researchers have found.

In research published Thursday, cybersecurity firm Silent Push said that the open-source command-and-control framework AdaptixC2 — originally designed for penetration testers — has been used to deliver malicious payloads in multiple recent attacks.

Researchers traced the tool’s development and promotion to a figure using the handle “RalfHacker,” who appears to maintain the project and operate a Russian-language Telegram channel. The individual describes themselves as a penetration tester, red team operator and “malware developer.”

“RalfHacker’s ties to Russia’s criminal underground — via the use of Telegram for marketing and the tool’s subsequent uptick in utilization by Russian threat actors — all raise significant red flags for our team,” the researchers said, adding that there is not yet conclusive proof of RalfHacker’s direct involvement in criminal operations.

Silent Push first observed abuse of AdaptixC2 in August 2025, when it was used to deliver the CountLoader malware — a loader strongly associated with Russian ransomware gangs. In one campaign, attackers distributed malicious PDFs impersonating Ukraine’s national police, the company said.

Palo Alto Networks’ Unit 42 research team observed similar activity with AdaptixC2 earlier this year but did not connect it to a specific threat actor.

AdaptixC2, available for free on GitHub, is marketed as a “post-exploitation and adversarial emulation framework” for security professionals. But its growing abuse highlights how open-source tools can easily cross into the cybercrime ecosystem, researchers said.

“Threat actors often mask their cyber criminal activities under the guise of “red teaming,” or ethical hacking, when communicating publicly with other threat actors,” the Silent Push team said, adding that RalfHacker’s online activity aligns with this practice.

AdaptixC2’s developer did not immediately respond to requests for comment. Developers of open-source red-teaming tools usually understand the tradeoffs that go with making their code available to the public.

Silent Push’s findings come as Russia’s cybercriminal scene undergoes major upheaval, according to a recent report by Recorded Future’s Insikt Group. The country’s hacking underworld is fracturing under pressure from law enforcement and internal mistrust, forcing groups to decentralize operations to avoid detection.

“The ecosystem is unlikely to contract; it will continue to reconfigure,” the report concluded. The Record is an editorially independent unit of Recorded Future.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/open-source-adaptixc2-red-teaming-tool-russian-cybercrime
如有侵权请联系:admin#unsafe.sh