Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Conduent Data Breach Impacts Over 10.5 Million Individuals

October 31, 2025

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

October 31, 2025

Chinese-Linked Hackers Exploit Windows Flaw to Spy on EU Diplomats

October 31, 2025
Facebook X (Twitter) Instagram
Friday, October 31
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Threat Actors Utilize AdaptixC2 for Malicious Payload Delivery
Cyber Security

Threat Actors Utilize AdaptixC2 for Malicious Payload Delivery

Team-CWDBy Team-CWDOctober 31, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A surge in cybercriminal abuse of AdaptixC2, a free adversarial emulation framework created initially for penetration testers, has been detected in active ransomware operations.

The tool, widely used for ethical security testing, is now appearing in malicious campaigns worldwide. 

Its deployment accelerated shortly after new detection signatures were released, linking it to CountLoader, a malware loader first highlighted in August 2025. This development was detailed in a new analysis published today by Silent Push researchers.

Ransomware Groups Turn to Legitimate Tools

AdaptixC2 operates as an extensible post-exploitation platform, with a Golang-based server and a GUI built in C++ and QT for cross-platform use.

Security teams employ it to simulate intrusions and test defenses. However, analysts observed the tool being delivered by CountLoader, indicating coordinated use by criminal actors.

Soon after detection rules were introduced, public incident reports documented an uptick in AdaptixC2 deployments across ransomware intrusions.

A DFIR investigation found an Akira affiliate using the tool. Akira has breached more than 250 organizations and generated about $42m since 2023, targeting businesses and critical infrastructure in Europe, North America and Australia.

This pattern mirrors a broader trend in which threat actors co-opt open-source offensive frameworks.

Developer Links Draw Scrutiny

Silent Push identified the alias “RalfHacker” as the most active developer contributing to AdaptixC2. The individual’s GitHub profile describes them as a penetration tester, red team operator and “MalDev.”

Analysts linked the alias to Russian-language Telegram channels that advertised the framework, as well as to email addresses found in leaked hacking-forum data. Although researchers have not confirmed direct involvement in attacks, the behavior prompted continued monitoring.

Read more on ransomware-tool abuse trends: Remote Access Abuse Biggest Pre-Ransomware Indicator

Attribution remains difficult because criminal actors often frame their activity as legitimate research. 

Russian-language promotion, Telegram activity and the framework’s sudden adoption among Russian-aligned operators raised concerns within the research team, which assessed with moderate confidence that the developer’s ties to criminal activity are meaningful.

Key Indicators to Watch

In their latest advisory, Silent Push shared a series of key indicators to watch to protect against this threat:

  • Network traffic contacting infrastructure associated with AdaptixC2 servers

  • Signs of CountLoader activity, which may precede AdaptixC2 deployment

  • Unusual Golang-based command-and-control communications

  • Unknown C++ QT applications executing within Windows, macOS or Linux environments

“Given that AdaptixC2, which RalfHacker regularly develops and maintains, remains in active use by cyber-criminals, our team assesses with moderate confidence that ties between the two are non-trivial and worthy of inclusion and continued observation,” Silent Push concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHow to help older family members avoid scams
Next Article Why You Should Swap Passwords for Passphrases
Team-CWD
  • Website

Related Posts

Cyber Security

Open Source “b3” Benchmark to Boost LLM Security for Agents

October 30, 2025
Cyber Security

PHP Servers and IoT Devices Face Growing Cyber-Attack Risks

October 29, 2025
Cyber Security

Chrome Zero-Day Actively Exploited in Attacks by Mem3nt0 mori

October 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

How chatbots can help spread scams

October 14, 2025

How to help older family members avoid scams

October 31, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.