Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Initial access hackers switch to Tsundere Bot for ransomware attacks
    Cybersecurity

    Initial access hackers switch to Tsundere Bot for ransomware attacks

    adminBy adminJanuary 29, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Initial access hackers switch to Tsundere Bot for ransomware attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Initial access hackers switch to Tsundere Bot for ransomware attacks

    A prolific initial access broker tracked as TA584 has been observed using the Tsundere Bot alongside XWorm remote access trojan to gain network access that could lead to ransomware attacks.

    Proofpoint researchers have been tracking TA584’s activity since 2020 and say that the threat actor has significantly increased its operations recently, introducing a continuous attack chain that undermines static detection.

    Tsundere Bot was first documented by Kaspersky last year and attributed to a Russian-speaking operator with links to the 123 Stealer malware.

    Wiz

    Although the goals and infection method remained murky at the time, Proofpoint says that “the malware can be used for information gathering, data exfiltration, lateral movement, and to install additional payloads.”

    “Given that Proofpoint has observed this malware used by TA584, researchers assess with high confidence Tsundere Bot malware infections could lead to ransomware,” the researchers note.

    TA584 activity in late 2025 tripled in volume compared to Q1 of the same year and expanded beyond the standard targeting scope of North America and the UK/Ireland to include Germany, various European countries, and Australia.

    Number of TA584 campaigns
    Number of TA584 campaigns
    Source: Proofpoint

    The currently prevalent attack chain begins with emails sent from hundreds of compromised, aged accounts, delivered via SendGrid and Amazon Simple Email Service (SES).

    The emails include unique URLs for each target, geofencing and IP filtering, and a mechanism of redirect chains often involving third-party traffic direction systems (TDS) like Keitaro.

    Those who pass the filters will land on a CAPTCHA page, followed by a ClickFix page instructing the target to run a PowerShell command on their system.

    CAPTCHA (left) and ClickFix (right) pages
    CAPTCHA (left) and ClickFix (right) pages
    Source: Proofpoint

    The command fetches and executes an obfuscated script, loads either XWorm or Tsundere Bot into memory, and redirects the browser to a benign site for deception.

    The PowerShell script
    The PowerShell script
    Source: Proofpoint

    Proofpoint says TA584 has used a large number of payloads over the years, including Ursnif, LDR4, WarmCookie, Xeno RAT, Cobalt Strike, and DCRAT, which was still seen in one case in 2025.

    Tsundere Bot is a malware-as-a-service platform with backdoor and loader capabilities. It requires Node.js to operate, which the malware adds to the victim system using installers generated from its command-and-control panel.

    The malware retrieves its command-and-control (C2) address from the Ethereum blockchain using a variant of the EtherHiding technique, with a hardcoded fallback address also included in the installer.

    It communicates with its C2 servers over WebSockets and includes logic to check the system locale, aborting execution if the system is using Commonwealth of Independent States (CIS) country languages (primarily Russian).

    Tsundere Bot collects system information to profile infected machines, can execute arbitrary JavaScript code received from the C2, and supports using infected hosts as SOCKS proxies. The malware platform also features a built-in market where bots can be sold and purchased.

    The researchers expect TA584 to attempt a broader range of targets and believe that the threat actor will keep experimenting with various payloads.


    Wiz

    Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

    Get the cheat sheet and take the guesswork out of secrets management.

    access attacks Bot hackers Initial ransomware switch Tsundere
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleBeware: Government Using Image Manipulation for Propaganda
    Next Article Stranger Things can’t catch a break since the finale, and the pile-on is now the point
    admin
    • Website

    Related Posts

    Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet

    March 15, 2026

    Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

    March 15, 2026

    Week in review: AiTM phishing kit used to hijack AWS accounts, year-long malware campaign targets HR

    March 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet

    March 15, 2026

    Update Chrome Immediately to Fix This Zero-Day Exploit

    March 15, 2026

    4 ways to practice Python without following a tutorial

    March 15, 2026

    Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

    March 15, 2026
    Categories
    • Blogging (40)
    • Cybersecurity (790)
    • Privacy & Online Earning (120)
    • SEO & Digital Marketing (488)
    • Tech Tools & Mobile / Apps (966)
    • WiFi / Internet & Networking (129)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet

    March 15, 2026

    Update Chrome Immediately to Fix This Zero-Day Exploit

    March 15, 2026

    4 ways to practice Python without following a tutorial

    March 15, 2026
    Most Popular
    • Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet
    • Update Chrome Immediately to Fix This Zero-Day Exploit
    • 4 ways to practice Python without following a tutorial
    • Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
    • This distraction-free writing app won’t let you backspace, and I love it
    • Week in review: AiTM phishing kit used to hijack AWS accounts, year-long malware campaign targets HR
    • Google Clock 8.6 APK Download by Google LLC
    • Fake enterprise VPN sites used to steal company credentials
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.