BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

New ChaosBot Rust Malware Uses Discord for C2 Attacks

ChaosBot: New Rust-Based Malware Uses Discord for Command-and-Control and Evades Detection, While Chaos Ransomware Evolves with Destructive and Clipboard Hijacking Features

  • A new Rust-based backdoor named ChaosBot allows remote command execution and reconnaissance on infected Windows systems.
  • ChaosBot uses Discord accounts for command-and-control communication with compromised devices.
  • The Malware spreads via compromised credentials and phishing messages containing malicious Windows shortcut (LNK) files.
  • ChaosBot employs evasion techniques such as bypassing Windows Event Tracing and detecting virtual machines to avoid analysis.
  • Chaos Ransomware has evolved with destructive file deletion and clipboard hijacking features to increase financial theft.

Cybersecurity experts identified a new backdoor malware called ChaosBot written in Rust, targeting Windows systems to gather information and run arbitrary commands. This malware was discovered by eSentire in late September 2025 within a financial services company’s network.

- Advertisement -

Threat actors gained access using stolen credentials linked to Cisco VPN and an over-privileged Active Directory account named “serviceaccount.” They used Windows Management Instrumentation (WMI) to remotely execute commands and deploy ChaosBot across the network. Notably, the malware uses Discord profiles operated by users “chaos_00019” and “lovebb0024” to issue commands to infected computers.

The malware may also spread through phishing emails that include malicious Windows shortcut files. When opened, these files execute PowerShell commands to download and launch ChaosBot while displaying a fake PDF to distract victims. The malware loads a malicious DLL by sideloading it with a Microsoft Edge executable, after which it performs system checks and installs a reverse proxy using the open-source FRP tool to maintain network access.

The operators attempted but failed to configure additional backdoors using Visual Studio Code Tunnel services. The main function remains interacting with the Discord channel associated with the victim’s computer for further instructions. ChaosBot supports commands for running shell commands, taking screenshots, and transferring files between victims and the Discord channel.

Researchers at eSentire reported that newer versions of ChaosBot use methods to avoid detection by Windows Event Tracing for Windows (ETW) and by identifying virtual machines through MAC address checks. If a virtual machine is detected, the malware exits to prevent analysis.

- Advertisement -

Separately, Fortinet FortiGuard Labs described an updated variant of Chaos ransomware written in C++ that includes new capabilities. This version can irreversibly delete large files instead of encrypting them, and it can hijack clipboard content by replacing legitimate Bitcoin addresses with those controlled by attackers. This tactic aims to increase financial losses through both data destruction and cryptocurrency theft.

The ransomware disguises itself as fake utilities like System Optimizer v2.1 to trick users into installing it. It checks for a file indicating previous infection before starting encryption. If run with admin rights, it disables system recovery features and encrypts files smaller than 50 MB, skipping those between 50 MB and 1.3 GB for efficiency. It uses various encryption methods, including symmetric, asymmetric, and a backup XOR routine to make removal more difficult.

For further information on ChaosBot, see the eSentire report. Details on the ransomware evolution are available in the Fortinet FortiGuard Labs report.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Ex-FTX engineer Nishad Singh fined $3.7 million

Former FTX head of engineering Nishad Singh settled a Commodity Futures Trading Commission (CFTC)...

Tether’s Jesse Spiro to Chair $100M Crypto Super PAC

Tether's Head of Government Affairs, Jesse Spiro, will chair the crypto-funded Fellowship PAC ahead...

CERT-UA Impersonated, New RAT Attack Hits Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) was impersonated in a phishing campaign...

Binance Launches Oil and Gas Futures with 100x Leverage

Binance has officially launched trading for oil and natural gas futures contracts, completing its...

Franklin Templeton Buys 250 Digital to Launch Crypto Unit

Franklin Templeton is establishing a dedicated crypto unit, Franklin Crypto, through the acquisition of...

Must Read

Top 5 Best Crypto Faucets To Earn Free Crypto This Year

QUICK LINKSWhat Are Crypto Faucets and How Do They Work?How Do Crypto Faucets Make Money?What to Expect: Realistic EarningsThe Best Crypto Faucets of 2025:...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading