CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
Trend Research uncovered a campaign by the Russian threat actor Water Gamayun that exploits a zero-day vulnerability in the Microsoft Management Console framework to execute malicious code, named MSC EvilTwin (CVE-2025-26633).
OPENCTI LABELS :
backdoor,infostealer,windows,zero-day,github,trojanspy,sha256,disease vector,msc eviltwin,water gamayun,encrypthub,cve-2025-26633
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin