You are currently viewing Inside the MSC EvilTwin Exploit Chain – How APTs Bypass MMC Security

Inside the MSC EvilTwin Exploit Chain – How APTs Bypass MMC Security

Executive Summary

A critical security feature bypass vulnerability in Microsoft Management Console (MMC), identified as CVE-2025-26633, has been weaponized in targeted attacks by Russian-aligned threat actors. This flaw, dubbed “MSC EvilTwin,” enables attackers to craft specially manipulated .msc files and provisioning packages which bypass security features in MMC, leading to malicious code execution and persistent backdoor installation. Security researchers have reported targeted campaigns using this vulnerability to deploy the SilentPrism and DarkWisp backdoors. The vulnerability has been patched by Microsoft, but exploitation in the wild remains active, making immediate updates essential for all organizations at risk.


Background on Water Gamayun & Attack Groups

Water Gamayun (also known as EncryptHub or LARVA-208) is a Russia-aligned APT group specializing in cyber-espionage and financial attacks. Their campaigns leverage the MSC EvilTwin vulnerability via social engineering and weaponized installer files (MSI, .msc) to gain persistence and exfiltrate data. Other payloads observed include Stealc and Rhadamanthys stealer. Sectors targeted are primarily telecommunications, finance, defense, and manufacturing. The attack groups abuse legitimate administrative tools and use custom Trojans for lateral movement and persistence.


Vulnerability Details

ParameterDetails
CVE-IDCVE-2025-26633
CVSS Score7.0 (High severity)
EPSS Score0.18% (Moderate probability of exploitation)
Vulnerability TypeSecurity Feature Bypass (Improper Neutralization)
Affected SoftwareMicrosoft Management Console (MMC) on Windows
CWECWE-707 (Improper Neutralization)
Patched inMarch-April 2025 Microsoft Security Updates

The vulnerability stems from improper neutralization of input in the MMC framework, permitting attackers with local access to bypass security features with specially crafted files. Exploit kits leveraging MSC EvilTwin can run unsigned malware and escalate privileges on compromised endpoints.


Infection Method and Attack Chain

The Water Gamayun attack leveraging CVE-2025-26633 typically follows this sequence:

  1. Initial Access: Delivery of spear-phishing emails or social engineering to entice victims into downloading malicious MSI or .msc files disguised as legitimate software.
  2. Exploitation: When opened, the crafted file abuses input sanitization flaws in MMC, bypassing security warnings and launching malware.
  3. Payload Execution: Stealthy installer drops payloads such as SilentPrism or DarkWisp, which run with administrative privileges.
  4. Backdoor Installation: The malware establishes persistence through malicious provisioning packages and registry changes, enabling remote attacker access.
  5. Persistence and Data Theft: The malware steals credentials, exfiltrates documents, and can deploy additional payloads for ransomware or network reconnaissance.

Malware Behavior and Capabilities

The backdoors and info-stealers used in these campaigns possess:

  • Remote Command Execution: Full control via C2 infrastructure.
  • Credential Theft: Extraction of passwords and tokens from browsers and Windows vault.
  • File Exfiltration: Targeted theft of sensitive documents.
  • Lateral Movement: Use of legitimate admin tools for moving across networks.
  • Persistence: Registry tweaks and Scheduler jobs maintain ongoing access.
  • Data Destruction/Ransomware: Double-extortion via encryption and theft.

Attack Techniques (MITRE ATT&CK Mapping)

  • T1566.001: Initial delivery through malicious MSI or .msc attachments.
  • T1105: Payloads and provisioning packages transferred post-exploitation.
  • T1059.001: Script execution via PowerShell and WMI.
  • T1053: Scheduled tasks for persistence.
  • T1020: Automated exfiltration to remote C2 servers.
  • T1027: Obfuscation with packed/provisioned files.

Visual: Water Gamayun Attack Flow

[Targeted Spearphishing/Provisioning Package]
-> [User Executes Malicious .msc or MSI File]
-> [MSC EvilTwin Exploit in MMC / Bypass Security Features]
-> [Payload Deployed: SilentPrism/DarkWisp Backdoor]
-> [Persistence via Registry/Scheduled Tasks]
-> [Remote Command and Control Communication]
-> [Credential Theft, Lateral Movement, Data Exfiltration]
-> [Optional Ransomware Deployment]

Indicators of Compromise (IOCs)

  • File Hashes:
    • SilentPrism: 4F670B4120AE913F9301...
    • DarkWisp: D18AF0D6C25EFE2A8C79...
  • Malicious Filenames & Paths:
    • Unusual .msc files in admin directories
    • MSI installers masquerading as DingTalk or VooV Meeting
  • Network Indicators:
    • Unexpected outbound connections to EncryptHub and Water Gamayun C2 domains

Threat Actor Attribution

Current intelligence attributes recent exploitation of CVE-2025-26633 to Water Gamayun (EncryptHub, Larva-208). Other Russian-associated groups may participate, using similar techniques and malware families. The group’s TTPs align with financial/espionage motives and persistent targeting of critical infrastructure and enterprise networks.


Mitigation Steps

  • Patch Software: Apply Microsoft updates from March–April 2025 for MMC and Windows.
  • Restrict File Execution: Limit use of MMC and administrative installer files; validate sources.
  • Threat Hunting:
    • Monitor for creation of suspicious .msc files and abnormal scheduled tasks.
    • Track outbound connections to known Water Gamayun/EncryptHub infrastructure.
  • IOC Monitoring: Feed threat intelligence (ESET, Trend Micro, internal SOC) into SIEM solutions.
  • User Awareness: Train staff regarding social engineering, malicious MSI/.msc files, and unusual file prompts.

Instantly Fix Risks with Saner Patch Management

Saner patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.

It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. Saner patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.

Experience the fastest and most accurate patching software here.