Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
好的,我现在要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100字以内,不需要特定的开头,直接写描述。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是AdaptixC2这个开源的C2框架被越来越多的威胁行为者使用,尤其是与俄罗斯勒索软件团伙有关的。AdaptixC2最初由GitHub上的RalfHacker发布,是一个用于渗透测试的框架,功能包括加密通信、命令执行等。 接下来,文章提到AdaptixC2被多个黑客组织采用,包括Fog和Akira勒索软件团伙以及一个使用CountLoader的初始访问代理。Palo Alto Networks Unit 42分析了这个框架的技术细节,并指出它被用于钓鱼诈骗和AI生成的PowerShell脚本。 虽然AdaptixC2是作为红队活动的开源工具发布的,但显然吸引了网络犯罪分子的注意。Silent Push调查发现RalfHacker在GitHub上的简介提到了“MalDev”,这可能引发对其背景的关注。 最后,文章提到RalfHacker可能与俄罗斯犯罪地下有关联,但目前没有直接证据表明他参与恶意活动。 现在我要把这些信息浓缩到100字以内。重点包括:AdaptixC2被威胁行为者使用,尤其是俄罗斯勒索团伙;功能强大且开源;开发者背景引发关注;工具被用于恶意活动。 总结时要注意逻辑连贯,信息完整。可能需要调整句子结构以节省字数。 </think> 开源C2框架AdaptixC2因其功能强大且易于扩展而被广泛采用,尤其受到与俄罗斯勒索软件团伙相关的威胁行为者青睐。该工具最初由渗透测试人员开发并开源,尽管旨在支持合法红队活动,但其模块化设计和跨平台兼容性使其成为网络犯罪分子的理想选择。 2025-10-30 16:40:0 Author: thehackernews.com(查看原文) 阅读量:2 收藏

The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are related to Russian ransomware gangs.

AdaptixC2 is an emerging extensible post-exploitation and adversarial emulation framework designed for penetration testing. While the server component is written in Golang, the GUI Client is written in C++ QT for cross-platform compatibility.

It comes with a wide range of features, including fully encrypted communications, command execution, credential and screenshot managers, and a remote terminal, among others. An early iteration was publicly released by a GitHub user named "RalfHacker" (@HackerRalf on X) in August 2024, who describes themselves as a penetration tester, red team operator, and "MalDev" (short for malware developer).

DFIR Retainer Services

In recent months, AdaptixC2 has been adopted by various hacking groups, including threat actors tied to the Fog and Akira ransomware operations, as well as by an initial access broker that has leveraged CountLoader in attacks that are designed to deliver various post-exploitation tools.

Palo Alto Networks Unit 42, which broke down the technical aspects of the framework last month, characterized it as a modular and versatile framework that can be used to "comprehensively control impacted machines," and that it has been put to use as part of fake help desk support call scams via Microsoft Teams and through an artificial intelligence (AI)-generated PowerShell script.

While AdaptixC2 is offered as an ethical, open-source tool for red teaming activities, it's also clear that it has attracted the attention of cybercriminals.

Cybersecurity company Silent Push said RalfHacker's GitHub bio about them being a "MalDev" triggered an investigation, allowing them to find several email addresses for GitHub accounts linked to the account's owner, in addition to a Telegram channel called RalfHackerChannel, where they re-shared messages posted on a dedicated channel for AdaptixC2. The RalfHackerChannel channel has more than 28,000 subscribers.

CIS Build Kits

In a message on the AdaptixFramework channel in August 2024, they mentioned their interest in starting a project about a "public C2, which is very trendy right now" and hoped "it will be like Empire," another popular post-exploitation and adversary emulation framework.

While it's currently not known if RalfHacker has any direct involvement in malicious activity tied to AdaptixC2 or CountLoader at this stage, Silent Push said their "ties to Russia's criminal underground, via the use of Telegram for marketing and the tool's subsequent uptick in utilization by Russian threat actors, all raise significant red flags."

The Hacker News has reached out to RalfHacker for comment, and we will update the story if we hear back.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/10/russian-ransomware-gangs-weaponize-open.html
如有侵权请联系:admin#unsafe.sh