Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Also known as: Seashell Blizzard, Sandworm, Quedagh, VOODOO BEAR, TEMP.Noble, IRON VIKING, G0034, ELECTRUM, TeleBots, IRIDIUM, Blue Echidna, FROZENBARENTS, UAC-0113, UAC-0082, APT44, BE2, PHANTOM, BlackEnergy Lite, UAC-0133, Sandworm Team, Phantom, Telebots, BlackEnergy (Group), Voodoo Bear, Iron Viking, CTG-7263, ATK 14, UAC-0125, APT 44, Grey Tornado, Razing Ursa, Curly COMrades, GRU military unit 74455, UNC3810, Hades
Curly COMrades is a threat actor identified by Amazon Threat Intelligence and Bitdefender, believed to operate in support of Russian interests. They employ techniques such as Hyper-V abuse for EDR evasion and utilize proxy tools like Resocks, SSH, and Stunnel to gain access to internal networks. Their activities include repeated attempts to extract the NTDS database from domain controllers and establishing covert access through virtualization features on compromised Windows 10 machines.
| CVE ID | Action |
|---|---|
| CVE-2019-10149 | View Details |
| CVE-2024-1709 | View Details |
| CVE-2013-3906 | View Details |
| CVE-2016-6662 | View Details |
| CVE-2024-1708 | View Details |
| CVE-2014-4114 | View Details |
| CVE-2014-7169 | View Details |