Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Rust Malware ChaosBot Exploits Discord

October 13, 2025
Reading Time: 3 mins read
in Alerts
Extortion Group Leaks Salesforce Data

A new backdoor, dubbed ChaosBot, has been discovered by cybersecurity researchers. The malware, which is written in the Rust programming language, allows attackers to take control of a compromised host to conduct reconnaissance and execute arbitrary commands. The eSentire cybersecurity firm first detected ChaosBot in late September 2025 within the environment of a financial services client. Attackers gained initial access by using stolen credentials for both a Cisco VPN and a privileged Active Directory account. They then used Windows Management Instrumentation (WMI) to remotely execute commands and deploy the ChaosBot malware across the network.

The malware stands out for its unique use of Discord as a command-and-control (C2) channel. Its name comes from a Discord profile used by the primary threat actor, who goes by the name “chaos_00019.” This individual issues remote commands to infected devices through Discord, with another user account, “lovebb0024,” also associated with C2 operations. The malware’s primary function is to interact with a specific Discord channel, created with the victim’s computer name, to receive instructions. It supports several commands, including “shell” for executing PowerShell commands, “scr” for taking screenshots, “download” for downloading files to the victim, and “upload” for uploading files to the Discord channel.

In addition to the initial access method, ChaosBot has also been observed spreading through phishing emails. These emails contain a malicious Windows shortcut (.LNK) file. If a recipient opens the file, it executes a PowerShell command to download and run ChaosBot. As a distraction, the malware simultaneously displays a decoy PDF file that appears to be from the State Bank of Vietnam. The malicious payload is a DLL file named “msedge_elf.dll,” which is sideloaded using a legitimate Microsoft Edge binary. After this, it conducts system reconnaissance and downloads a fast reverse proxy (FRP) to create a reverse proxy into the network, ensuring persistent access.

Researchers also noted the attackers attempted to configure a Visual Studio Code Tunnel service as an additional backdoor for command execution, but this effort was unsuccessful. The malware also includes evasion techniques to bypass Event Tracing for Windows (ETW) and virtual machine (VM) detection. It achieves this by patching the ntdll!EtwEventWrite function and by checking for MAC addresses commonly used by VMware and VirtualBox. If it detects a VM environment, the malware will simply exit, preventing analysis.

In a separate report, Fortinet FortiGuard Labs detailed a new, more destructive variant of Chaos Ransomware, written in C++. This variant introduces two new capabilities: destructive encryption and clipboard hijacking. Unlike traditional ransomware that only encrypts files, this version can irrevocably delete large files (over 1.3 GB) rather than encrypting them. Furthermore, it manipulates clipboard content by replacing copied Bitcoin addresses with an attacker-controlled wallet address to redirect cryptocurrency transfers. This dual-pronged approach of destructive extortion and financial fraud makes the new Chaos variant a more aggressive and multifaceted threat.

The new Chaos-C++ ransomware is typically distributed by posing as bogus utilities like “System Optimizer v2.1” to trick users into installing it. Previous versions of Chaos ransomware have been distributed under the guise of fake applications like OpenAI ChatGPT and InVideo AI. Once launched, the malware first checks for a specific file to determine if it has already been executed on the machine. If not, it checks for administrative privileges and then runs a series of commands to inhibit system recovery. The ransomware then begins its encryption process, fully encrypting files under 50 MB, while skipping those between 50 MB and 1.3 GB. The ransomware uses a combination of symmetric or asymmetric encryption and a fallback XOR routine, making its execution more robust and difficult to disrupt.

Reference:

  • New Rust Based Malware ChaosBot Uses Discord To Remotely Control Victim Computers
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Extortion Group Leaks Salesforce Data

Malicious Npm Packages Used In Phishing

October 13, 2025
Extortion Group Leaks Salesforce Data

Fake Inflation Refund Text Scam Hits NY

October 13, 2025
BatShadow Unleashes Go Vampire Bot

BatShadow Unleashes Go Vampire Bot

October 10, 2025
BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

October 10, 2025
Redis Use After Free Bug Enables RCE

FileFix Attack Evades Security Tools

October 10, 2025
Hackers Abuse WordPress for Phishing

Hackers Abuse WordPress for Phishing

October 10, 2025

Latest Alerts

Malicious Npm Packages Used In Phishing

Fake Inflation Refund Text Scam Hits NY

Rust Malware ChaosBot Exploits Discord

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Subscribe to our newsletter

    Latest Incidents

    Harvard Probes Breach Tied To Oracle Flaw

    Qilin Ransomware Hits Beer Giant Asahi

    Fortra Reports GoAnywhere MFT Breach

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial