{"uuid": "588e8132-ed4c-4262-a39c-b9f1bf560371", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/cibsecurity/83972", "content": "\ud83d\udd8b\ufe0f Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp \ud83d\udd8b\ufe0f\n\nThe threat actors behind the zeroday exploitation of a recentlypatched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism and DarkWisp. The activity has been attributed to a suspected Russian hacking group called Water Gamayun, which is also known as EncryptHub and LARVA208. \"The threat actor deploys payloads primarily by means of.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-04-01T05:16:33.000000Z"}