Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion

Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion

Posted on November 18, 2025November 18, 2025 By CWS

Nov 18, 2025Ravie LakshmananMalware / Social Engineering
Cybersecurity researchers have disclosed particulars of a cyber assault concentrating on a serious U.S.-based real-estate firm that concerned using a nascent command-and-control (C2) and crimson teaming framework often called Tuoni.
“The marketing campaign leveraged the rising Tuoni C2 framework, a comparatively new, command-and-control (C2) instrument (with a free license) that delivers stealthy, in-memory payloads,” Morphisec researcher Shmuel Uzan mentioned in a report shared with The Hacker Information.
Tuoni is marketed as a sophisticated C2 framework designed for safety professionals, facilitating penetration testing operations, crimson group engagements, and safety assessments. A “Neighborhood Version” of the software program is freely accessible for obtain from GitHub. It was first launched in early 2024.

The assault, per Morphisec, unfolded in mid-October 2025, with the unknown risk actor doubtless leveraging social engineering by way of Microsoft Groups impersonation for preliminary entry. It is suspected that the attackers doubtless posed as trusted distributors or colleagues to deceive an worker on the firm into working a PowerShell command.
The command, for its half, downloads a second PowerShell script from an exterior server (“kupaoquan[.]com”), which, in flip, employs steganographic methods to hide the next-stage payload inside a bitmap picture (BMP). The first purpose of the embedded payload is to extract shellcode and execute it immediately in reminiscence.
This leads to the execution of “TuoniAgent.dll,” which corresponds to an agent that operates inside the focused machine and connects to a C2 server (on this case, “kupaoquan[.]com”), permitting for distant management.
“Whereas Tuoni itself is a classy however conventional C2 framework, the supply mechanism confirmed indicators of AI help in code era, evident from the scripted feedback and modular construction of the preliminary loader,” Morphisec added.
The assault, though in the end unsuccessful, demonstrates continued abuse of crimson teaming instruments for malicious functions. In September 2025, Verify Level detailed using a synthetic intelligence (AI)-powered instrument known as HexStrike AI to quickly speed up and simplify vulnerability exploitation.

The Hacker News Tags:Attempted, C2s, Cyber, Detail, Intrusion, RealEstate, Researchers, Role, Tuoni

Post navigation

Previous Post: Pennsylvania Attorney General Confirms Data Breach After Ransomware Attack
Next Post: Nudge Security Raises $22.5 Million in Series A Funding

Related Posts

How to Close Threat Detection Gaps: Your SOC’s Action Plan How to Close Threat Detection Gaps: Your SOC’s Action Plan The Hacker News
Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion The Hacker News
SolarWinds Fixes Major Flaws in Serv-U Software SolarWinds Fixes Major Flaws in Serv-U Software The Hacker News
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL The Hacker News
WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories The Hacker News
New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark