Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

This week’s science news: Anomalies inside Earth, the Artemis II leak and how psychedelics can help treat PTSD

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Tsundere botnet scales with gaming lures on Windows and Ethereum-based C2
Identity

Tsundere botnet scales with gaming lures on Windows and Ethereum-based C2

userBy userNovember 20, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 20, 2025Ravi LakshmananBotnet/Malware

Cybersecurity researchers have warned that a botnet called “Tsundere” targeting Windows users is actively expanding.

Kaspersky researcher Lisandro Uviedo said in an analysis published today that the threat has been active since mid-2025 and is designed to execute arbitrary JavaScript code retrieved from command-and-control (C2) servers.

Details about how botnet malware is propagated are currently unknown. However, in at least one case, the attackers behind this operation allegedly used legitimate remote monitoring and management (RMM) tools as a conduit to download MSI installer files from a compromised site.

The names given to the malware artifacts – Valorant, r6x (Rainbow Six Siege X), and cs2 (Counter-Strike 2) – also suggest that the implant may be spread using gaming lures. Users looking for pirated versions of these games may be targeted.

Regardless of the method used, the fake MSI installer is designed to install Node.js and launch a loader script that is responsible for decrypting and executing the main botnet-related payload. Also, use the ‘npm install’ command to prepare the environment by downloading three official libraries: ws, ethers, and pm2.

DFIR retainer service

“The pm2 package is installed to ensure that the Tsundere bot remains active and is used to launch the bot,” Uviedo explained. “In addition, pm2 achieves persistence on the system by writing to the registry and configuring the process to restart on login.”

Kaspersky Lab’s analysis of the C2 panel revealed that the malware also propagates in the form of PowerShell scripts. This script performs a similar set of actions by deploying Node.js on the compromised host and downloading ws and ethers as dependencies.

PowerShell infectors do not leverage pm2, but perform the same actions observed in MSI installers by creating registry key values. This will spawn a new instance of the bot itself and cause it to run on every login.

Tsundere botnet leverages the Ethereum blockchain to obtain WebSocket C2 server details (e.g. ws://193.24.123)[.]68:3011 or ws://185.28.119[.]179:1234), creating a resilient mechanism that allows attackers to rotate infrastructure simply by employing smart contracts. This contract was created on September 23, 2024 and has resulted in 26 transactions to date.

Once the C2 address is obtained, it verifies that it is a valid WebSocket URL, proceeds to establish a WebSocket connection with the specific address, and receives the JavaScript code sent by the server. Kaspersky said that no subsequent commands from the server were observed during the observation period.

“The ability to evaluate the code makes Tsundere bots relatively simple, but they also have flexibility and dynamism that allows botnet administrators to adapt them to a wide range of actions,” Kaspersky said.

Botnet operations are facilitated by a control panel where logged-in users can use MSI or PowerShell to build new artifacts, manage administrative functions, view the number of bots at any given time, convert bots into proxies for routing malicious traffic, and browse and purchase botnets through a dedicated marketplace.

CIS build kit

It’s unclear exactly who is behind Tsundere, but the presence of Russian in the source code for logging purposes suggests a Russian-speaking attacker. This activity has been assessed to be functionally duplicated with a malicious npm campaign documented by Checkmarx, Phylum, and Socket in November 2024.

Additionally, the same server has been identified as hosting a C2 panel associated with the information stealer known as 123 Stealer, which is available on a $120 per month subscription basis. According to Outpost24’s KrakenLabs team, it was first promoted by a threat actor named “koneko” on a dark web forum on June 17, 2025.

Another clue to its Russian origins is that customers are prohibited from using the stealer to target Russia and Commonwealth of Independent States (CIS) countries. “Violating this rule will result in your account being immediately blocked without explanation,” Koneko said in a post at the time.

“Infections can occur via MSI or PowerShell files, which are flexible enough to impersonate installers, serve as phishing entry points, or integrate with other attack mechanisms, making them even more of a formidable threat,” Kaspersky said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe best guide to spotting AI writing comes from Wikipedia
Next Article Scientists placed moss on the outside of the International Space Station for nine months and then continued to grow it on Earth
user
  • Website

Related Posts

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

This week’s science news: Anomalies inside Earth, the Artemis II leak and how psychedelics can help treat PTSD

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.