Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using Leverage Tuoni C2 Framework Tool to Stealthily Deliver In-Memory Payloads

Posted on November 19, 2025November 20, 2025 By CWS

A brand new wave of cyberattacks has emerged utilizing the Tuoni Command and Management (C2) framework, a classy device that enables risk actors to deploy malicious payloads immediately into system reminiscence.

This system helps attackers keep away from detection by conventional safety options that depend on scanning recordsdata saved on disk.

The Tuoni framework has gained consideration within the cybersecurity group for its modular design and talent to assist a number of assault eventualities with out leaving important traces on compromised programs.

The assault sometimes begins with phishing emails or compromised web sites that ship the preliminary payload. As soon as executed, the malware establishes a connection to the attacker’s C2 server and waits for additional directions.

What makes Tuoni significantly harmful is its use of in-memory execution, which means the malicious code runs fully throughout the pc’s RAM with out writing recordsdata to the onerous drive.

This strategy considerably reduces the probabilities of detection by antivirus software program and endpoint safety instruments.

Morphisec safety researchers recognized the risk throughout routine monitoring of suspicious community actions. Their evaluation revealed that attackers had been utilizing Tuoni to ship secondary payloads together with credential stealers, ransomware, and distant entry trojans.

The framework helps numerous communication protocols and may mix its site visitors with respectable community exercise, making it difficult for safety groups to determine compromised machines.

Technical Evaluation of Tuoni’s In-Reminiscence Execution

The Tuoni framework employs a number of superior strategies to take care of stealth whereas working on contaminated programs. At its core, the malware makes use of course of injection to insert its code into respectable Home windows processes comparable to svchost.exe or explorer.exe.

Invoke-DataBlock perform (Supply – Morphisec)

That is achieved by API calls like VirtualAllocEx and WriteProcessMemory, which allocate reminiscence house throughout the goal course of and write the malicious payload into that house.

LPVOID addr = VirtualAllocEx(hProcess, NULL, payloadSize, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
WriteProcessMemory(hProcess, addr, payload, payloadSize, NULL);
CreateRemoteThread(hProcess, NULL, 0, (LPTHREAD_START_ROUTINE)addr, NULL, 0, NULL);

The framework additionally implements encryption for its community communications, utilizing AES-256 to encode knowledge transmitted between the contaminated host and the C2 server.

This prevents community monitoring instruments from inspecting the content material of instructions and stolen knowledge. Organizations ought to implement reminiscence scanning capabilities and monitor for uncommon course of behaviors to detect Tuoni infections successfully.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Deliver, Framework, Hackers, InMemory, Leverage, Payloads, Stealthily, Tool, Tuoni

Post navigation

Previous Post: Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers
Next Post: Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

Related Posts

20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled Cyber Security News
New NFC-Driven PhantomCard Android Malware Attacking Banking Users Cyber Security News
Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone Cyber Security News
Zscaler Acquires Enterprise AI Security Firm SPLX to Boost Zero Trust Exchange Cyber Security News
WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access Cyber Security News
15 Best Bandwidth Monitoring Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data
  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data
  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark