
EncryptHub, a known threat actor also tracked as Water Gamayun, leverages a recently patched Windows zero-day vulnerability, CVE-2025-26633, to distribute malicious software. The attack involves deploying backdoors and infostealers to exfiltrate sensitive data from targeted systems.
Classified as an improper neutralization vulnerability within Microsoft Management Console (MMC), CVE-2025-26633 holds a CVSS score of 7.0. The issue, rectified by Microsoft during this month’s Patch Tuesday update, enables attackers to bypass a crucial security feature locally. Â
Trend Micro has dubbed the exploit "MSC EvilTwin," highlighting its mechanism of using duplicate Microsoft Console (.msc) files and MMC’s Multilingual User Interface Path (MUIPath). Attackers manipulate .msc files to execute malicious payloads instead of legitimate ones. Â
The attack utilizes PowerShell-based loader MSC EvilTwin to create two identically named .msc files in separate directories. When the original .msc file is executed, the MMC unintentionally selects the malicious version stored in the directory "en-US," bypassing detection.
Trend Micro’s analysis also reveals EncryptHub employing additional methods, including ExecuteShellCommand exploits via MMC’s function to download next-stage payloads and deploying malicious .msc files in altered folders like "C:\Windows \System32" (with trailing spaces) to bypass User Account Control (UAC).
The threat actor has developed an array of malware tools under its umbrella, including the EncryptHub Stealer and backdoors known as DarkWisp and SilentPrism, collectively referred to as EncryptRAT by Outpost24. Infostealers such as Rhadamanthys and StealC are also in the group’s arsenal.
The attack begins with victims downloading seemingly legitimate installation files, such as digitally signed MSIs impersonating popular Chinese software like DingTalk or QQTalk. These files serve as a pretext for remotely fetching and running MSC EvilTwin loaders.