Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Well, I’m a little less angry about the “Magnificent Ambersons” AI project

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Rust-based malware ‘ChaosBot’ hijacks Discord channels and takes control of victims’ PCs
Identity

New Rust-based malware ‘ChaosBot’ hijacks Discord channels and takes control of victims’ PCs

userBy userOctober 13, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 13, 2025Ravi LakshmananRansomware/Windows Security

Rust-based malware "chaos bot"

Cybersecurity researchers have revealed details of a new Rust-based backdoor called ChaosBot. This allows operators to perform reconnaissance and execute arbitrary commands on compromised hosts.

“Threat actors exploited compromised credentials mapped to both Cisco VPN and an overprivileged Active Directory account named ‘serviceaccount,'” eSentire said in a technical report published last week. “The compromised accounts were used to leverage WMI to execute remote commands across systems within the network, facilitating the deployment and execution of ChaosBot.”

The Canadian cybersecurity firm said it first detected the malware within a financial services customer’s environment in late September 2025.

ChaosBot is notable for its abuse of Discord for command and control (C2). The name comes from a Discord profile managed by the attacker behind the online name “chaos_00019”, which is responsible for issuing remote commands to infected devices. The second Discord user account associated with C2 operations is lovebb0024.

Alternatively, this malware has been observed to rely on phishing messages that include malicious Windows Shortcut (LNK) files as distribution vectors. When the message recipient opens the LNK file, a PowerShell command is executed to download and execute ChaosBot, which then displays a decoy PDF disguised as a legitimate communication from the State Bank of Vietnam as a distraction mechanism.

DFIR retainer service

The payload is a malicious DLL (‘msedge_elf.dll’) that is sideloaded using a Microsoft Edge binary called ‘identity_helper.exe’. It then performs system reconnaissance, downloads Fast Reverse Proxy (FRP), and opens a reverse proxy to your network to maintain permanent access to the compromised network.

The attackers were also found to have used this malware to unsuccessfully configure the Visual Studio Code tunnel service, which acts as an additional backdoor to enable command execution capabilities. However, the main function of the malware is to communicate with a Discord channel created by the operator using the victim’s computer name to receive further instructions.

Some of the supported commands are listed below.

Shell, run shell commands via PowerShell scr, capture screenshots Download, download files to the victim device Upload, upload files to a Discord channel

“New variants of ChaosBot use evasion techniques to evade ETW [Event Tracing for Windows] and virtual machines,” eSentire said.

“The first technique patches the first few instructions of ntdll!EtwEventWrite (xor eax, eax -> ret). The second technique matches the system’s MAC address with known virtual machine MAC address prefixes in VMware and VirtualBox. If a match is found, the malware exits.”

Chaos ransomware gains destructive clipboard hijacking capabilities

With this disclosure, Fortinet FortiGuard Labs detailed a new Chaos ransomware variant written in C++. The ransomware introduces new destructive capabilities that irrevocably delete large files rather than encrypt them, and manipulate the contents of the clipboard by swapping Bitcoin addresses with attacker-controlled wallets and redirecting cryptocurrency transfers.

“The dual strategy of destructive encryption and covert financial theft highlights Chaos’ transition to a more aggressive, multifaceted threat aimed at maximizing financial gain,” the company said.

By incorporating destructive extortion tactics and clipboard hijacking into cryptocurrency theft, attackers aim to position Chaos-C++ ransomware as a powerful tool that can not only encrypt files, but also delete file contents larger than 1.3 GB to facilitate financial fraud.

CIS build kit

The Chaos-C++ ransomware downloader disguises itself as a fake utility like System Optimizer v2.1 to trick users into installing it. It is worth mentioning here that previous versions of Chaos ransomware, such as Lucky_Gh0$t, were distributed under the guise of OpenAI ChatGPT and InVideo AI.

Once launched, the malware checks for the presence of a file named “%APPDATA%\READ_IT.txt”. This indicates that ransomware is already running on your machine. If the file exists, it enters a so-called watch mode and keeps a tab on the system clipboard.

If the file does not exist, Chaos-C++ checks to see if it is running elevated, and if so, proceeds to run a series of commands that prevent system recovery and launches an encryption process to fully encrypt files smaller than 50 MB. On the other hand, it will skip files between 50 MB and 1.3 GB in file size, probably for efficiency reasons.

“Rather than relying solely on full file encryption, Chaos-C++ employs a combination of methods, including symmetric or asymmetric encryption and fallback XOR routines,” Fortinet said. “A versatile downloader also ensures successful execution. Combining these approaches makes ransomware execution more robust and less likely to be interrupted.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew bug in Oracle E-Business Suite could allow hackers to access data without logging in
Next Article Astaroth banking Trojan exploits GitHub and continues to operate even after removal
user
  • Website

Related Posts

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Well, I’m a little less angry about the “Magnificent Ambersons” AI project

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

India changes deep tech startup rules

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.