BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Sophisticated Tuoni C2 Malware Targets US Real-Estate Firm

AI-Assisted Tuoni Framework Used in Sophisticated October 2025 Cyberattack on U.S. Real Estate Firm

  • A U.S.-based real estate company was targeted in October 2025 by an attack using the emerging Tuoni command-and-control (C2) framework.
  • The attack involved social engineering through Microsoft Teams impersonation to trick an employee into executing a malicious PowerShell command.
  • The payload was concealed using steganography inside a bitmap image and executed in memory to avoid detection.
  • Tuoni, a red teaming tool available as a free Community Edition on GitHub, was used to establish remote control over the infected machine.
  • The initial loader showed signs of AI-generated scripting, highlighting the blend of advanced methods in the attack.

In mid-October 2025, a cyberattack targeted a major U.S.-based real estate company utilizing the recently developed Tuoni command-and-control framework. The intruders employed social engineering tactics, impersonating trusted vendors or colleagues via Microsoft Teams to convince an employee to run a PowerShell command.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

This command retrieved a secondary PowerShell script from an external server, kupaoquan[.]com. The script used steganography, a method of hiding data within an image file, by embedding the payload inside a bitmap (BMP) image. The payload extracted shellcode and executed it directly in memory without writing to disk.

The executed payload launched “TuoniAgent.dll,” an agent component of the Tuoni C2 framework, which connects the compromised system to the attacker’s remote server. The Tuoni framework is described as an advanced tool designed for penetration testing and red team operations, and its Community Edition has been publicly available on GitHub since early 2024.

Researchers noted that the initial loader script displayed modular code and comments suggesting it was assisted by Artificial Intelligence in its creation. Although the attack did not succeed, it demonstrated how legitimate security tools can be misused by threat actors.

This incident adds to recent examples of AI-assisted cyber threats, such as those involving the HexStrike AI tool, which simplifies and speeds up exploiting software vulnerabilities.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Epic Games Lays Off 1,000+

Epic Games is laying off over 1,000 employees, citing a significant decline in Fortnite...

Microsoft, Nvidia Deploy AI for Nuclear Development

Microsoft and NVIDIA have launched a joint AI initiative to accelerate nuclear energy project...

Theta’s AI Agents Now Respond in Tables & Buttons

Theta's EdgeCloud AI agents can now autonomously respond with rich UI components like tables...

BitGo, Susquehanna Offer Crypto OTC Prediction Market Trades

BitGo and Susquehanna Crypto have partnered to create the first institutional OTC offering for...

French Firms Targeted by Resume-Carrying Cryptomining Malware

A phishing campaign uses fake, obfuscated French-language resumes to deliver malware that mines cryptocurrency...

Must Read

7 Best Audiobooks on Cybersecurity

Cybersecurity has become an essential topic in our increasingly digital world. As technology evolves and becomes more integrated into our daily lives, the importance...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading