Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hank Green’s Focus Friend named Google Play’s app of the year

Google launches Gemini 3 with new coding apps and benchmark scores

Cloudflare blames ‘potential bug’ for massive internet outage

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers detail Tuoni C2’s role in 2025 real estate cyber intrusion attempt
Identity

Researchers detail Tuoni C2’s role in 2025 real estate cyber intrusion attempt

userBy userNovember 18, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 18, 2025Ravi LakshmananMalware/Social Engineering

Cybersecurity researchers have revealed details of a cyberattack that targeted a major US-based real estate company. This attack included the use of an early command and control (C2) and red team framework known as Tuoni.

“This campaign leveraged the emerging Tuoni C2 framework, a relatively new command-and-control (C2) tool (with a free license) that stealthly delivers in-memory payloads,” Morphisec researcher Shmuel Yuzan said in a report shared with Hacker News.

Tuoni is touted as an advanced C2 framework designed for security professionals, facilitating penetration testing operations, red team engagement, and security assessments. The “community edition” of the software is available for free download from GitHub. The first release was in early 2024.

CIS build kit

According to Morphisec, the attack occurred in mid-October 2025, and an unknown attacker may have used social engineering to impersonate Microsoft Teams for initial access. The attacker likely tricked the company’s employees into executing PowerShell commands by posing as a trusted vendor or colleague.

This command downloads a second PowerShell script from an external server (‘kupaoquan'[.]com”) uses steganography techniques to hide the next stage payload inside a bitmap image (BMP). The primary purpose of the embedded payload is to extract and execute shellcode directly in memory.

This will run “TuoniAgent.dll”. This corresponds to an agent that runs inside the target machine and connects to the C2 server (in this case “kupaoquan”).[.]com), which enables remote control.

“While Tuoni itself is a sophisticated but traditional C2 framework, the delivery mechanism showed signs of AI assistance in code generation, as evidenced by scripted comments and the modular structure of the initial loader,” Morphisec added.

Although this attack ultimately failed, it shows that red teaming tools are continually being exploited for malicious purposes. In September 2025, Check Point detailed the use of an artificial intelligence (AI)-powered tool called HexStrike AI to quickly accelerate and simplify vulnerability exploitation.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIranian hackers use DEEPROOT and TWOSTROKE malware in aerospace and defense attacks
Next Article Swiss ski resorts forever contaminated with chemicals from ski wax
user
  • Website

Related Posts

Learn how leading enterprises protect cloud workloads and infrastructure at scale

November 18, 2025

Iranian hackers use DEEPROOT and TWOSTROKE malware in aerospace and defense attacks

November 18, 2025

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hank Green’s Focus Friend named Google Play’s app of the year

Google launches Gemini 3 with new coding apps and benchmark scores

Cloudflare blames ‘potential bug’ for massive internet outage

Learn how leading enterprises protect cloud workloads and infrastructure at scale

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.