A Deep Dive into Water Arsenal and Infrastructure
Water Gamayun, a suspected Russian threat actor, exploits the MSC EvilTwin zero-day vulnerability (CVE-2025-26633) to compromise systems and exfiltrate data. The group uses custom payloads like EncryptHub Stealer variants, SilentPrism and DarkWisp backdoors, as well as known malware like Stealc and Rhadamanthys. Their delivery methods include malicious provisioning packages, signed .msi files, and Windows MSC files. The attackers employ techniques such as LOLBins and encrypted communications to evade detection. Their infrastructure includes C&C servers for managing infected systems and exfiltrating data. The campaign highlights the group's adaptability and sophistication in cyber espionage operations.
Pulse ID: 67e7cba2606bdb8acfedda1c
Pulse Link: https://otx.alienvault.com/pulse/67e7cba2606bdb8acfedda1c
Pulse Author: AlienVault
Created: 2025-03-29 10:29:54
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
