By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion
Computing

Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion

News Room
Last updated: 2025/11/18 at 11:21 AM
News Room Published 18 November 2025
Share
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion
SHARE

Nov 18, 2025Ravie LakshmananMalware / Social Engineering

Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming framework known as Tuoni.

“The campaign leveraged the emerging Tuoni C2 framework, a relatively new, command-and-control (C2) tool (with a free license) that delivers stealthy, in-memory payloads,” Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News.

Tuoni is advertised as an advanced C2 framework designed for security professionals, facilitating penetration testing operations, red team engagements, and security assessments. A “Community Edition” of the software is freely available for download from GitHub. It was first released in early 2024.

DFIR Retainer Services

The attack, per Morphisec, unfolded in mid-October 2025, with the unknown threat actor likely leveraging social engineering via Microsoft Teams impersonation for initial access. It’s suspected that the attackers likely posed as trusted vendors or colleagues to deceive an employee at the company into running a PowerShell command.

The command, for its part, downloads a second PowerShell script from an external server (“kupaoquan[.]com”), which, in turn, employs steganographic tricks to conceal the next-stage payload within a bitmap image (BMP). The primary goal of the embedded payload is to extract shellcode and execute it directly in memory.

This results in the execution of “TuoniAgent.dll,” which corresponds to an agent that operates within the targeted machine and connects to a C2 server (in this case, “kupaoquan[.]com”), allowing for remote control.

“While Tuoni itself is a sophisticated but traditional C2 framework, the delivery mechanism showed signs of AI assistance in code generation, evident from the scripted comments and modular structure of the initial loader,” Morphisec added.

The attack, although ultimately unsuccessful, demonstrates continued abuse of red teaming tools for malicious purposes. In September 2025, Check Point detailed the use of an artificial intelligence (AI)-powered tool called HexStrike AI to rapidly accelerate and simplify vulnerability exploitation.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Day the Internet Died: How an Underwater Cable Cut Plunged a Nation Into Digital Darkness The Day the Internet Died: How an Underwater Cable Cut Plunged a Nation Into Digital Darkness
Next Article Agentic AI powers the next wave of manufacturing ERP –  News Agentic AI powers the next wave of manufacturing ERP – News
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Why does the internet keep crashing so often in 2025?
Why does the internet keep crashing so often in 2025?
News
The 11 best US Black Friday and Cyber Monday travel deals already taking off
The 11 best US Black Friday and Cyber Monday travel deals already taking off
News
Securing  Java Microservices with Zero Trust Architecture | HackerNoon
Securing Java Microservices with Zero Trust Architecture | HackerNoon
Computing
Your Roku TV Streaming Stick Might Be Spying On You – Here’s How – BGR
Your Roku TV Streaming Stick Might Be Spying On You – Here’s How – BGR
News

You Might also Like

Securing  Java Microservices with Zero Trust Architecture | HackerNoon
Computing

Securing Java Microservices with Zero Trust Architecture | HackerNoon

9 Min Read
19 startups selected for WTIA’s 13th Founder Cohort Accelerator Program
Computing

19 startups selected for WTIA’s 13th Founder Cohort Accelerator Program

1 Min Read
NVK Still Working Toward Ray-Tracing, Vulkan Video & More Performance
Computing

NVK Still Working Toward Ray-Tracing, Vulkan Video & More Performance

2 Min Read
WeChat integrates AI Search with DeepSeek, seeks to allay concerns over user privacy · TechNode
Computing

WeChat integrates AI Search with DeepSeek, seeks to allay concerns over user privacy · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?