www.itfunk.orgwww.itfunk.orgwww.itfunk.org
  • Home
  • Tech News
    Tech NewsShow More
    Under the Hood of Microsoft’s May 2025 Patch Tuesday: The CLFS and WinSock Problem Microsoft Can’t Seem to Fix
    7 Min Read
    The Hidden Sabotage: How Malicious Go Modules Quietly Crashed Linux Systems
    6 Min Read
    Agentic AI: The Next Frontier in Cybersecurity Defense and Risk​
    5 Min Read
    Cybersecurity CEO Arrested for Allegedly Installing Malware on Hospital Computers: A Stark Reminder of Insider Threats
    8 Min Read
    Cybercriminals Hijack Google’s Reputation
    7 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Vulnerabilities
  • How To Guides
    How To GuidesShow More
    Tasksche.exe Malware
    Nviqri Someq Utils Unwanted Application
    4 Min Read
    How to Deal With Rbx.fund Scam
    4 Min Read
    How to Jailbreak DeepSeek: Unlocking AI Without Restrictions
    4 Min Read
    Why Streaming Services Geo-Restrict Content?
    10 Min Read
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    IT/Cybersecurity Best PracticesShow More
    Under the Hood of Microsoft’s May 2025 Patch Tuesday: The CLFS and WinSock Problem Microsoft Can’t Seem to Fix
    7 Min Read
    Affordable Endpoint Protection Platforms (EPP) for Small Businesses
    5 Min Read
    Outlaw Malware: A Persistent Threat Exploiting Linux Servers
    4 Min Read
    CVE-2024-48248: Critical NAKIVO Backup & Replication Flaw Actively Exploited—Patch Immediately
    6 Min Read
    How to Jailbreak DeepSeek: Unlocking AI Without Restrictions
    4 Min Read
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org. All Rights Reserved.
Reading: MSC EvilTwin (CVE-2025-26633): A Silent Saboteur in Microsoft’s MMC Console
Share
Notification Show More
Font ResizerAa
www.itfunk.orgwww.itfunk.org
Font ResizerAa
  • Tech News
  • How To Guides
  • Cyber Threats
  • Product Reviews
  • Cybersecurity for Business
  • Free Scan
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How To Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • Cybersecurity for Business
  • FREE SCAN
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org All Rights Reserved.
www.itfunk.org > Blog > Cyber Threats > Microsoft CVE Vulnerabilities > MSC EvilTwin (CVE-2025-26633): A Silent Saboteur in Microsoft’s MMC Console
Cyber ThreatsMicrosoft CVE VulnerabilitiesTech News

MSC EvilTwin (CVE-2025-26633): A Silent Saboteur in Microsoft’s MMC Console

When Trusted Tools Turn Treacherous: The Silent Threat of MSC EvilTwin

ITFunk Research
Last updated: June 12, 2025 4:18 pm
ITFunk Research
Share
MSC EvilTwin (CVE-2025-26633): A Silent Saboteur in Microsoft’s MMC Console
SHARE

In early 2025, cybersecurity professionals raised the alarm on a zero-day exploit in Microsoft’s Management Console (MMC), now cataloged as CVE-2025-26633 and dubbed MSC EvilTwin. This dangerous vulnerability has already been exploited in the wild by a sophisticated adversary known as Water Gamayun, posing a significant risk to Windows-based environments.

Contents
What is CVE-2025-26633 / MSC EvilTwin?Technical BreakdownHow the Exploit WorksMalware Payloads Linked to the MSC EvilTwin ExploitEncryptHub StealerDarkWisp BackdoorSilentPrism ImplantRhadamanthys StealerWho Is Water Gamayun?Threat Infrastructure and Delivery MethodsProtective Measures: How to Stay Safe1. Patch Immediately2. Restrict .MSC Execution3. Hunt for IOCs4. Educate End Users5. Use EDR SolutionsFinal Analysis: Why MSC EvilTwin MattersKey Takeaway

What is CVE-2025-26633 / MSC EvilTwin?

MSC EvilTwin takes advantage of a logic flaw in how Windows MMC handles localized resources. Specifically, it abuses the MUIPath mechanism to trick the console into executing a malicious .msc file hidden in language-specific subdirectories like en-US.

By planting a rogue console file that mimics a legitimate one, attackers can exploit this oversight to load unauthorized DLLs and run arbitrary shell commands—all without requiring any input from the victim.


Technical Breakdown

  • Classification: Local Privilege Escalation (LPE) and Remote Code Execution (RCE)
  • Entry Point: Malformed .msc files placed strategically using Windows’ localization paths
  • Affected Systems: Windows 10, Windows 11, and various Windows Server editions with vulnerable MMC versions
  • Discovery Credited To: Trend Micro and independent security researchers

How the Exploit Works

The attack hinges on the order in which MMC resolves localized console files. Here’s how adversaries manipulate that process:

  1. A harmless-looking .msc file is placed in a standard location.
  2. A malicious version of the same-named file is positioned in the localized en-US directory.
  3. When opened, MMC prioritizes the localized variant due to internal path resolution logic.
  4. The rogue file executes ExecuteShellCommand, launching scripts or binaries without triggering alerts.

This process allows attackers to quietly inject and run payloads under the guise of a trusted Microsoft utility.


Malware Payloads Linked to the MSC EvilTwin Exploit

Trend Micro’s investigations revealed multiple malware strains being delivered via this vector:

EncryptHub Stealer

Harvests browser logins, clipboard data, crypto wallets, and system details. Exfiltration is handled via stealthy HTTP POST requests.

DarkWisp Backdoor

Grants remote attackers persistent access with full shell capabilities and file transfer functions. Uses TLS-encryptedchannels for C2 communication.

SilentPrism Implant

Built for stealth and lateral movement, SilentPrism blends in with native Windows processes to evade detection.

Rhadamanthys Stealer

A commercial “malware-as-a-service” tool. Targets sensitive credentials from FTP clients, banking apps, and messaging platforms.


Who Is Water Gamayun?

The name behind the chaos, Water Gamayun, is believed to be an Eastern European hacking group with a long history of exploiting built-in Windows features (LOLBins) and deploying zero-days in phishing campaigns. Their operations often involve:

  • Modular payloads
  • Dynamic DNS infrastructure
  • Hosting malicious files on legitimate platforms like GitHub and Dropbox

Historically, they’ve been linked to espionage and financial theft campaigns, particularly in North America and Europe’s critical infrastructure sectors.


Threat Infrastructure and Delivery Methods

Water Gamayun relies on a fast-moving attack infrastructure. Their payloads are hosted using:

  • Cloud storage services (e.g., Dropbox)
  • Dynamic DNS domains
  • GitHub repositories

This approach allows them to rapidly rotate infrastructure, evade takedowns, and stay ahead of detection systems.


Protective Measures: How to Stay Safe

1. Patch Immediately

Microsoft has issued an emergency fix. Make sure systems are up to date via Windows Update or the Microsoft Security Response Center (MSRC).

2. Restrict .MSC Execution

Use tools like AppLocker or Windows Defender Application Control (WDAC) to limit the execution of unsigned or unknown .msc files.

3. Hunt for IOCs

Monitor for red flags such as:

  • Shells launching from mmc.exe
  • File activity in C:\Windows\System32\en-US\
  • Suspicious registry modifications

4. Educate End Users

Train employees to be cautious with strange attachments and console files, especially from unsolicited emails or unfamiliar sources.

5. Use EDR Solutions

Modern Endpoint Detection and Response (EDR) tools can spot abnormal behaviors like unsigned DLL injection or command-line abuse from MMC.


Final Analysis: Why MSC EvilTwin Matters

What makes CVE-2025-26633 so dangerous is not just the technical trickery—it’s the stealth and familiarity of the tools it exploits. MMC is trusted, well-worn software in enterprise environments, and few would suspect it of becoming a vector for remote access or malware delivery.

By exploiting trusted behaviors and overlooked mechanics, Water Gamayun has shown how modern cyberattacks are shifting from brute-force techniques to surgical strikes that use the system’s own features against it.

This incident should be a wake-up call for defenders. Security isn’t just about watching the perimeter—it’s about knowing your environment intimately. Even the most mundane components can become threat vectors if left unexamined.


Key Takeaway

MSC EvilTwin isn’t just another zero-day—it’s a reminder that trust, once granted, can be weaponized. As threat actors move toward stealthy, fileless, and system-native tactics, defenders must adapt by focusing on behavioral monitoring, zero trust principles, and internal threat modeling.

You Might Also Like

Shopping Helper Extension
Finished Updating Mail Server Scam
Medidmakingbythe.org Ads
OttPzx.Co.In Ads
Ads by ers-adguard.pro
TAGGED:CVE-2025 Windows patchCVE-2025-26633Cybersecurity 2025 threatsDarkWisp Backdooren-US folder attack vectorEncryptHub Stealer malwareExploit malicious .msc filesLiving off the land attackMalware delivery via MMCMicrosoft Management Console exploitMMC security flawMSC EvilTwin vulnerabilityRemote code execution WindowsRhadamanthys infostealerSilentPrism implantTrend Micro vulnerability discoveryWater Gamayun threat groupWindows 11 security exploitWindows zero-day 2025Zero-day vulnerability MMC

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Remove PelDox Ransomware (.lczx File Virus)
Next Article How to Remove Trojan.IcedID.ANJ Malware
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Malware

Don’t leave your system unprotected. Download SpyHunter today for free, and scan your device for malware, scams, or any other potential threats. Stay Protected!

Download SpyHunter 5
Download SpyHunter for Mac
✅ Free Scan Available • ⭐ Catches malware instantly
//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Support

Sign Up for Our Newesletter

Subscribe to our newsletter to get our newest articles instantly!

 

www.itfunk.orgwww.itfunk.org
© 2023 www.itfunk.org. All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?