Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Use Amazon MSK Connect and Iceberg Kafka Connect to build a real-time data lake

    February 5, 2026

    Detecting backdoored language models at scale

    February 4, 2026

    Piezotronic-probe modulates piezoelectric-electric-thermal coupling field in GaN power electronics

    February 4, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Initial access hackers switch to Tsundere Bot for ransomware attacks
    IT/ Cybersecurity

    Initial access hackers switch to Tsundere Bot for ransomware attacks

    big tee tech hubBy big tee tech hubJanuary 29, 2026023 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Initial access hackers switch to Tsundere Bot for ransomware attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Initial access hackers switch to Tsundere Bot for ransomware attacks

    A prolific initial access broker tracked as TA584 has been observed using the Tsundere Bot alongside XWorm remote access trojan to gain network access that could lead to ransomware attacks.

    Proofpoint researchers have been tracking TA584’s activity since 2020 and say that the threat actor has significantly increased its operations recently, introducing a continuous attack chain that undermines static detection.

    Tsundere Bot was first documented by Kaspersky last year and attributed to a Russian-speaking operator with links to the 123 Stealer malware.

    Wiz

    Although the goals and infection method remained murky at the time, Proofpoint says that “the malware can be used for information gathering, data exfiltration, lateral movement, and to install additional payloads.”

    “Given that Proofpoint has observed this malware used by TA584, researchers assess with high confidence Tsundere Bot malware infections could lead to ransomware,” the researchers note.

    TA584 activity in late 2025 tripled in volume compared to Q1 of the same year and expanded beyond the standard targeting scope of North America and the UK/Ireland to include Germany, various European countries, and Australia.

    Number of TA584 campaigns
    Number of TA584 campaigns
    Source: Proofpoint

    The currently prevalent attack chain begins with emails sent from hundreds of compromised, aged accounts, delivered via SendGrid and Amazon Simple Email Service (SES).

    The emails include unique URLs for each target, geofencing and IP filtering, and a mechanism of redirect chains often involving third-party traffic direction systems (TDS) like Keitaro.

    Those who pass the filters will land on a CAPTCHA page, followed by a ClickFix page instructing the target to run a PowerShell command on their system.

    CAPTCHA (left) and ClickFix (right) pages
    CAPTCHA (left) and ClickFix (right) pages
    Source: Proofpoint

    The command fetches and executes an obfuscated script, loads either XWorm or Tsundere Bot into memory, and redirects the browser to a benign site for deception.

    The PowerShell script
    The PowerShell script
    Source: Proofpoint

    Proofpoint says TA584 has used a large number of payloads over the years, including Ursnif, LDR4, WarmCookie, Xeno RAT, Cobalt Strike, and DCRAT, which was still seen in one case in 2025.

    Tsundere Bot is a malware-as-a-service platform with backdoor and loader capabilities. It requires Node.js to operate, which the malware adds to the victim system using installers generated from its command-and-control panel.

    The malware retrieves its command-and-control (C2) address from the Ethereum blockchain using a variant of the EtherHiding technique, with a hardcoded fallback address also included in the installer.

    It communicates with its C2 servers over WebSockets and includes logic to check the system locale, aborting execution if the system is using Commonwealth of Independent States (CIS) country languages (primarily Russian).

    Tsundere Bot collects system information to profile infected machines, can execute arbitrary JavaScript code received from the C2, and supports using infected hosts as SOCKS proxies. The malware platform also features a built-in market where bots can be sold and purchased.

    The researchers expect TA584 to attempt a broader range of targets and believe that the threat actor will keep experimenting with various payloads.


    Wiz

    As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

    This free cheat sheet outlines 7 best practices you can start using today.



    Source link

    access Attacks Bot hackers Initial Ransomware Switch Tsundere
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Analytics Context Engineering for LLM

    February 4, 2026

    AWS IAM Identity Center now supports multi-Region replication for AWS account access and application use

    February 4, 2026

    FBI takes notorious RAMP ransomware forum offline

    February 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Use Amazon MSK Connect and Iceberg Kafka Connect to build a real-time data lake

    February 5, 2026

    Detecting backdoored language models at scale

    February 4, 2026

    Piezotronic-probe modulates piezoelectric-electric-thermal coupling field in GaN power electronics

    February 4, 2026

    Hyundai Motor Group partners with Vodafone IoT to deploy connected cars in the Middle East

    February 4, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Use Amazon MSK Connect and Iceberg Kafka Connect to build a real-time data lake

    February 5, 2026

    Detecting backdoored language models at scale

    February 4, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.