New ChaosBot Rust Malware Uses Discord for C2 Attacks

ChaosBot: New Rust-Based Malware Uses Discord for Command-and-Control and Evades Detection, While Chaos Ransomware Evolves with Destructive and Clipboard Hijacking Features

  • A new Rust-based backdoor named ChaosBot allows remote command execution and reconnaissance on infected Windows systems.
  • ChaosBot uses Discord accounts for command-and-control communication with compromised devices.
  • The Malware spreads via compromised credentials and phishing messages containing malicious Windows shortcut (LNK) files.
  • ChaosBot employs evasion techniques such as bypassing Windows Event Tracing and detecting virtual machines to avoid analysis.
  • Chaos Ransomware has evolved with destructive file deletion and clipboard hijacking features to increase financial theft.

Cybersecurity experts identified a new backdoor malware called ChaosBot written in Rust, targeting Windows systems to gather information and run arbitrary commands. This malware was discovered by eSentire in late September 2025 within a financial services company’s network.

- Advertisement -

Threat actors gained access using stolen credentials linked to Cisco VPN and an over-privileged Active Directory account named “serviceaccount.” They used Windows Management Instrumentation (WMI) to remotely execute commands and deploy ChaosBot across the network. Notably, the malware uses Discord profiles operated by users “chaos_00019” and “lovebb0024” to issue commands to infected computers.

The malware may also spread through phishing emails that include malicious Windows shortcut files. When opened, these files execute PowerShell commands to download and launch ChaosBot while displaying a fake PDF to distract victims. The malware loads a malicious DLL by sideloading it with a Microsoft Edge executable, after which it performs system checks and installs a reverse proxy using the open-source FRP tool to maintain network access.

The operators attempted but failed to configure additional backdoors using Visual Studio Code Tunnel services. The main function remains interacting with the Discord channel associated with the victim’s computer for further instructions. ChaosBot supports commands for running shell commands, taking screenshots, and transferring files between victims and the Discord channel.

Researchers at eSentire reported that newer versions of ChaosBot use methods to avoid detection by Windows Event Tracing for Windows (ETW) and by identifying virtual machines through MAC address checks. If a virtual machine is detected, the malware exits to prevent analysis.

- Advertisement -

Separately, Fortinet FortiGuard Labs described an updated variant of Chaos ransomware written in C++ that includes new capabilities. This version can irreversibly delete large files instead of encrypting them, and it can hijack clipboard content by replacing legitimate Bitcoin addresses with those controlled by attackers. This tactic aims to increase financial losses through both data destruction and cryptocurrency theft.

The ransomware disguises itself as fake utilities like System Optimizer v2.1 to trick users into installing it. It checks for a file indicating previous infection before starting encryption. If run with admin rights, it disables system recovery features and encrypts files smaller than 50 MB, skipping those between 50 MB and 1.3 GB for efficiency. It uses various encryption methods, including symmetric, asymmetric, and a backup XOR routine to make removal more difficult.

For further information on ChaosBot, see the eSentire report. Details on the ransomware evolution are available in the Fortinet FortiGuard Labs report.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Ethereum Foundation opens Post-Quantum team, $2M prizes set!

Ethereum Foundation has formed a dedicated Post-Quantum team to address accelerating quantum threats.The effort...

Bitcoin nodes running BIP-110 rise to 2.38% as OP_RETURN cap

2.38% of Bitcoin nodes (583 of 24,481) are signaling support for BIP-110.BIP-110 would cap...

Ethereum Tokenization Surge Lifts ETH; Shiba Inu Boosts Now!

Ethereum is central to a growing push to tokenize real-world assets, which may increase...

GameStop Moves 4,710 BTC to Coinbase Sparks Exit Speculation

GameStop moved its entire Bitcoin holding—4,710 BTC—to Coinbase Prime.Analytics firm CryptoQuant spotted the transfers;...

RBI Pushes BRICS CBDC Link, US Dollar Faces Shift, Reserves.

The Reserve Bank of India proposed linking all BRICS nations’ CBDCs for trade.India hosts...
- Advertisement -

Must Read

What Is a Sim Swap Hack?

You've likely heard the term 'sim-swap,' but do you really know what it means? It's a type of fraud that's rapidly increasing, where scammers...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!