Threat intelligence researchers have discovered an expanding campaign where cybercriminals are weaponizing AdaptixC2, an open-source Command and Control (C2) framework originally built for legitimate penetration testing. First observed by Silent Push analysts during investigations into the CountLoader malware in August 2025, the attacks revealed coordinated use of AdaptixC2 and CountLoader to deliver malicious payloads. Public reporting later confirmed that ransomware groups, particularly Akira ransomware affiliates, had adopted AdaptixC2 to manage their post-exploitation operations across global campaigns. AdaptixC2’s flexible design—featuring a Golang-based server and C++ GUI client compatible with Windows, Linux, and macOS—has made it an appealing choice for both red teams and cybercriminals. The framework’s open availability on GitHub, coupled with its advanced post-exploitation features, enabled threat actors to repurpose it for stealthy control of compromised systems. Researchers traced its development to a GitHub user known as “RalfHacker”, who claims to be a penetration tester and malware developer. Further investigation uncovered connections between RalfHacker’s accounts and leaked databases from Russian hacking forums as well as a Telegram channel used for updates and communication in Russian, indicating deep links to the Russian cybercriminal ecosystem. The weaponization of legitimate red team tools such as AdaptixC2 underscores the blurred line between ethical hacking and criminal activity. Attackers exploit these tools’ credibility to evade detection and maintain plausible deniability. Security experts urge organizations to closely monitor network traffic for AdaptixC2-related indicators, as the framework remains actively maintained and increasingly used in ransomware operations targeting businesses and infrastructure worldwide.
Security researchers have revealed a highly sophisticated Linux rootkit named Singularity, which can bypass Elastic Security’s endpoint detection and response (EDR) mechanisms. T...
The Symantec Threat Hunter Team has uncovered two major cyber intrusions targeting Ukrainian organizations, attributed to Russian-aligned threat actors. Active from late June to Au...
Attackers based in China are taking advantage of vulnerabilities in Cisco ASA, which is widely used by governments and big organizations around the world. According to Palo Alto Ne...