Skip to content

Criminal elements are reportedly employing covert malware to infiltrate government systems

Cybercriminals identified as CurlyCOMrades carry out attacks on Moldova and Georgia

Criminal elements exploit concealed malware, posing a threat to government entities
Criminal elements exploit concealed malware, posing a threat to government entities

Criminal elements are reportedly employing covert malware to infiltrate government systems

Curly COMrades, a newly identified advanced persistent threat (APT) group, has been actively targeting critical organizations in geopolitically sensitive regions such as Georgia and Moldova since mid-2024. Their primary focus has been on government and judicial entities, as well as energy companies.

The suspected connection to Russia stems from their alignment with Russian geopolitical interests. Although definitive links to any known Russian threat actors have not been established, their tactics, targets, and operational goals notably support Russian strategic objectives.

Technically, the group is distinguished by their heavy use of the curl.exe utility for command-and-control (C2) communication and the hijacking of Component Object Model (COM) objects. They employ a mix of publicly available tools (LOLBins), open-source projects, and custom malware such as a backdoor called MucorAgent to achieve stealth, persistence, and lateral movement across networks with minimal detection.

MucorAgent, a three-stage Windows malware component engineered as a .NET stealthy tool, runs hidden commands, keeps them encrypted to avoid detection, and sends the results back to the attacker.

The group's exposure was first reported by Bitdefender Labs and corroborated by other cybersecurity sources, who emphasize their role in supporting Russian state objectives through cyber espionage in critical regions experiencing geopolitical shifts.

Key Aspects of Curly COMrades

  • Who they are: A new advanced persistent threat actor targeting geopolitical hotbeds since mid-2024.
  • Primary targets: Government, judicial bodies, energy firms in Georgia and Moldova.
  • Techniques: Credential theft (NTDS and LSASS dumps), COM hijacking, curl.exe use for C2, proxy relays, custom malware (MucorAgent).
  • Connection to Russia: Aligned with Russian geopolitical goals; suspected support of Russian interests but low-confidence direct attribution.
  • Operational goals: Long-term network access, data exfiltration, network control.

Curly COMrades' operations may align with the geopolitical goals of the Russian Federation, but there are no strong overlaps with known Russian APT groups. This data is current as of August 2025, reflecting ongoing monitoring and analysis in cybersecurity communities.

Read also:

Latest