AdaptixC2: Open-Source C2 Tool Gains Traction with Ransomware-Linked Actors

by | Oct 31, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

What AdaptixC2 is

AdaptixC2 is an extensible, open-source command-and-control (C2) and post-exploitation framework designed for red-team and adversary-emulation use. The server is implemented in Golang, while the GUI client is a C++ Qt application to support cross-platform use. Publicly released in an early form in August 2024, the project is positioned as a professional tool for penetration testers, but its design and public availability make it attractive for misuse.


Features and technical profile

AdaptixC2 offers a broad set of capabilities typical of modern C2 frameworks:

  • Encrypted communications between operators and agents.
  • Command execution and a remote interactive terminal.
  • Credential management and screenshot capture.
  • Extensible module/plugin model enabling additional functionality as needed.

Its modular architecture and cross-platform client make rapid development and deployment feasible for both legitimate red teams and malicious operators.


Abuse and malware ecosystem links

Security firms report growing criminal adoption of AdaptixC2. Several threat actors — including groups tied to the Fog and Akira ransomware operations — have been observed leveraging the framework. An initial access broker has reportedly used CountLoader in delivery chains that end with AdaptixC2 and other post-exploitation tools.

Palo Alto Networks Unit 42 described AdaptixC2 as modular and versatile, noting real-world abuse in social-engineering scams (fake help-desk calls over Microsoft Teams) and attacks that used AI-generated PowerShell scripts to automate post-exploitation tasks.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses



Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Developer, community, and risk signals

The original public iteration was published by a GitHub user known as RalfHacker (@HackerRalf), who self-identifies as a penetration tester and “MalDev.” Researchers at Silent Push highlighted several risk factors tied to the project’s community footprint:

  • Public GitHub presence and linked email addresses.
  • A high-subscribers Telegram channel (RalfHackerChannel) used to share AdaptixC2 updates and related content (reported to have ~28,000 subscribers).
  • Public discussion about building a “public C2” and comparisons to frameworks like Empire.

Those community signals, combined with observed upticks in AdaptixC2 usage by actors linked to Russian-speaking cybercrime, raised red flags for some researchers — though direct criminal attribution of the developer has not been established publicly.


Why open-source C2 tools get weaponized

AdaptixC2’s trajectory mirrors a wider trend: free/red-team frameworks such as Havoc, Mythic, and Sliver — and historically, cracked versions of Cobalt Strike or Brute Ratel — are often repurposed by malicious actors because they:

  • Lower technical barriers to advanced post-exploitation.
  • Provide ready-made, maintained tooling for C2, lateral movement, and persistence.
  • Allow operators to blend legitimate-looking tooling into attack chains.

Public availability plus active communities accelerate feature development, but also speed up criminal adoption and knowledge transfer.




Defensive guidance

Organizations and defenders should treat the rise of AdaptixC2 as part of a broader risk picture and take pragmatic steps:

  • Hunt for C2 indicators: monitor for unusual TLS-encrypted outbound connections, bespoke client binaries, unexpected PowerShell one-liners, and behavior consistent with credential harvesting, remote shells, or screenshot exfiltration.
  • Secure initial access vectors: harden remote access (MFA everywhere), patch exposed RDP/VPN/Collaboration services, and monitor for initial-access broker activity such as CountLoader.
  • Endpoint controls & EDR: ensure EDR detects command-execution patterns, suspicious new services, and cross-process network I/O that matches C2 profiles.
  • Telemetry & threat intel sharing: exchange IOCs and TTPs with trusted sources (ISACs, vendors, CERTs) to detect reuse of public tools in malicious campaigns.
  • Operational countermeasures: apply application allowlisting, network egress controls, and least-privilege principles for service accounts that attackers commonly abuse.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: thehackernews.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This