Russian Threat Actor EncryptHub Exploits a Microsoft Management Console Zero-Day Flaw 

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

EncryptHub, a known threat actor also tracked as Water Gamayun, leverages a recently patched Windows zero-day vulnerability, CVE-2025-26633, to distribute malicious software. The attack involves deploying backdoors and infostealers to exfiltrate sensitive data from targeted systems.

Classified as an improper neutralization vulnerability within Microsoft Management Console (MMC), CVE-2025-26633 holds a CVSS score of 7.0. The issue, rectified by Microsoft during this month’s Patch Tuesday update, enables attackers to bypass a crucial security feature locally.  

Trend Micro has dubbed the exploit "MSC EvilTwin," highlighting its mechanism of using duplicate Microsoft Console (.msc) files and MMC’s Multilingual User Interface Path (MUIPath). Attackers manipulate .msc files to execute malicious payloads instead of legitimate ones.  

Example of mmc.exe MUI file handling
Example of mmc.exe MUI file handling | Source: TrendMicro

The attack utilizes PowerShell-based loader MSC EvilTwin to create two identically named .msc files in separate directories. When the original .msc file is executed, the MMC unintentionally selects the malicious version stored in the directory "en-US," bypassing detection.

The ExecuteShellCommand method is part of the MMC View Object
The ExecuteShellCommand method, part of the MMC View Object | Source: TrendMicro

Trend Micro’s analysis also reveals EncryptHub employing additional methods, including ExecuteShellCommand exploits via MMC’s function to download next-stage payloads and deploying malicious .msc files in altered folders like "C:\Windows \System32" (with trailing spaces) to bypass User Account Control (UAC).

The threat actor has developed an array of malware tools under its umbrella, including the EncryptHub Stealer and backdoors known as DarkWisp and SilentPrism, collectively referred to as EncryptRAT by Outpost24. Infostealers such as Rhadamanthys and StealC are also in the group’s arsenal.

The attack begins with victims downloading seemingly legitimate installation files, such as digitally signed MSIs impersonating popular Chinese software like DingTalk or QQTalk. These files serve as a pretext for remotely fetching and running MSC EvilTwin loaders.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: