Contact

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin

NetmanageIT OpenCTI - opencti.netmanageit.com

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin



SUMMARY :

Trend Research uncovered a campaign by the Russian threat actor Water Gamayun that exploits a zero-day vulnerability in the Microsoft Management Console framework to execute malicious code, named MSC EvilTwin (CVE-2025-26633).

OPENCTI LABELS :

backdoor,infostealer,windows,zero-day,github,trojanspy,sha256,disease vector,msc eviltwin,water gamayun,encrypthub,cve-2025-26633


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin