Researchers have uncovered a sophisticated campaign by the Russia-aligned APT group Water Gamayun (also known as EncryptHub) that leverages a newly identified vulnerability in the Windows Microsoft Management Console (MMC). The vulnerability, CVE-2025-26633, has been dubbed "MSC EvilTwin" and allows for arbitrary code execution through a trusted Windows process, mmc.exe. The attack chain, detailed by Zscaler's threat hunting team, involves tricking a user into opening a malicious .msc file. This file exploits the vulnerability to load a rogue component that, in turn, executes a series of obfuscated PowerShell payloads. This method of proxying execution through a legitimate system binary is a powerful defense evasion technique. The campaign's objective is believed to be the deployment of the group's signature malware, including backdoors and information stealers, for long-term espionage.
mmc.exe) The "MSC EvilTwin" vulnerability resides in how the MMC handles path resolution for snap-in modules. By crafting a malicious .msc file, an attacker can cause mmc.exe to load a malicious snap-in from an attacker-controlled path. Because mmc.exe is a signed, trusted Microsoft binary, this action may not be flagged as suspicious by basic security tools. The malicious snap-in's TaskPad can contain embedded commands, which in this campaign are used to launch a Base64-encoded PowerShell script, kicking off the next stage of the attack while a decoy document is displayed to the user.
The multi-stage attack proceeds as follows:
.msc file. When the user opens it, mmc.exe is launched, exploiting CVE-2025-26633.mmc.exe loads a rogue snap-in, which executes an embedded PowerShell command. This technique is a form of signed binary proxy execution.While the C2 server for the final payload was inactive during analysis, Water Gamayun is known to deploy malware such as the SilentPrism and DarkWisp backdoors, or the EncryptHub and Rhadamanthys information stealers.
This campaign showcases the actor's focus on stealth and defense evasion by living off the land and abusing trusted system components.
MITRE ATT&CK Techniques Observed:
T1189 - Drive-by Compromise leading to user download of a malicious file.T1204.002 - Malicious File (opening the .msc file).T1218.014 - Signed Script Proxy Execution is the core of the attack, using mmc.exe to run malicious code. The use of PowerShell also maps to T1059.001 - PowerShell.T1027 - Obfuscated Files or Information is used for the Base64-encoded PowerShell payload.T1071.001 - Web Protocols would be used by the final payload to communicate with the C2 server.The primary impact of this campaign is successful, stealthy espionage. By using a novel vulnerability and proxying execution through mmc.exe, Water Gamayun can bypass security controls and establish a persistent foothold in target networks. Once their backdoors or stealers are installed, they can exfiltrate sensitive data, intellectual property, and credentials over a long period. For affected government and enterprise networks, this can lead to significant data loss and a compromise of strategic information. The reliance on a trusted binary makes detection challenging, meaning the attackers could dwell in the network for an extended time before being discovered.
No specific file hashes or C2 domains were provided in the source articles.
mmc.exe being launched with unusual file paths or from suspicious sources (e.g., from a .zip or .rar file in the user's Downloads folder).mmc.exe spawning child processes, especially powershell.exe. This is highly anomalous behavior for the Microsoft Management Console and a strong indicator of this attack technique.| Type | Value | Description |
|---|---|---|
process_name |
mmc.exe |
Monitor for mmc.exe spawning child processes like powershell.exe or cmd.exe. |
file_name |
*.msc |
Scrutinize .msc files originating from untrusted sources like email attachments or web downloads. |
command_line_pattern |
powershell.exe -enc |
The presence of encoded PowerShell commands is a common evasion technique that warrants investigation. |
mmc.exe launching powershell.exe. This is a high-fidelity detection for the MSC EvilTwin technique (D3-PA: Process Analysis).D3-DA: Dynamic Analysis) to analyze .msc files from suspicious sources. A sandbox can detonate the file in a safe environment and reveal the subsequent malicious PowerShell execution.mmc.exe spawning unexpected child processes.D3-SU: Software Update)..msc files from being downloaded from the internet or received as email attachments if there is no business need for them. This can be configured at the email gateway and web proxy.D3-EAL: Executable Allowlisting).Apply the patch for CVE-2025-26633 from Microsoft to eliminate the vulnerability.
Mapped D3FEND Techniques:
Use application control to prevent mmc.exe from launching PowerShell or to restrict PowerShell itself.
Mapped D3FEND Techniques:
The core of the 'MSC EvilTwin' attack is the abuse of a legitimate process (mmc.exe) to launch a malicious one (powershell.exe). This makes Process Analysis, specifically monitoring parent-child process relationships, the most effective detection technique. Security teams must configure their EDR or SIEM to generate a high-severity alert whenever the parent process mmc.exe is observed spawning a child process of powershell.exe or cmd.exe. This is extremely anomalous behavior; the Microsoft Management Console has no legitimate reason to launch a command shell. By creating this specific detection rule, defenders can create a high-fidelity tripwire for this exact TTP. This moves beyond simple signature-based detection and focuses on the behavioral artifact of the attack, making it resilient to changes in the malware's file hash or the content of the PowerShell script.
The most definitive mitigation for the Water Gamayun campaign is to apply the security patch from Microsoft that remediates CVE-2025-26633. A robust and timely patch management program is fundamental to cybersecurity. Organizations should use automated tools to scan their environment for all Windows systems vulnerable to this flaw. Prioritization should be given to workstations of users with privileged access and those in sensitive departments (e.g., finance, legal, R&D), as they are common APT targets. The patch should be deployed as soon as possible after appropriate testing. Verifying successful installation across the enterprise is a critical final step. Until the patch is deployed, the detection and hardening measures serve as crucial compensating controls, but patching is the only way to fully eliminate the underlying vulnerability.
To disrupt the initial access stage of this attack, organizations should implement strict inbound traffic filtering at their email gateways and web proxies. Since the attack begins with a user downloading a malicious RAR archive containing a .msc file, security policies should be configured to block these file types from being downloaded or received as attachments. There are very few legitimate business reasons for users to receive .msc (Microsoft Saved Console) files from external sources. By blocking this file extension, along with other script-based files (.js, .vbs, etc.) and archives containing them, organizations can significantly reduce their attack surface and prevent the 'MSC EvilTwin' payload from ever reaching the endpoint. This is a proactive hardening measure that stops the attack chain at the very first step.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats