Article Details
Scrape Timestamp (UTC): 2025-12-01 05:09:42.813
Source: https://thehackernews.com/2025/12/tomiris-shifts-to-public-service.html
Original Article Text
Click to Toggle View
Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets. The threat actor known as Tomiris has been attributed to attacks targeting foreign ministries, intergovernmental organizations, and government entities in Russia with an aim to establish remote access and deploy additional tools. "These attacks highlight a notable shift in Tomiris's tactics, namely the increased use of implants that leverage public services (e.g., Telegram and Discord) as command-and-control (C2) servers," Kaspersky researchers Oleg Kupreev and Artem Ushkov said in an analysis. "This approach likely aims to blend malicious traffic with legitimate service activity to evade detection by security tools." The cybersecurity company said more than 50% of the spear-phishing emails and decoy files used in the campaign used Russian names and contained Russian text, indicating that Russian-speaking users or entities were the primary focus. The spear-phishing emails have also targeted Turkmenistan, Kyrgyzstan, Tajikistan, and Uzbekistan using tailored content written in their respective national languages. The attacks aimed at high-value political and diplomatic infrastructure have leveraged a combination of reverse shells, custom implants, and open-source C2 frameworks like Havoc and AdaptixC2 to facilitate post-exploitation. Details of Tomiris first emerged in September 2021 when Kaspersky shed light on the inner workings of a backdoor of the same name, pinpointing its links with SUNSHUTTLE (aka GoldMax), a malware used by the Russian APT29 hackers behind the SolarWinds supply chain attack, and Kazuar, a .NET-based espionage backdoor used by Turla. Despite these overlaps, Tomiris is assessed to be a different threat actor that mainly focuses on intelligence gathering in Central Asia. Microsoft, in a report published in December 2024, connected the Tomiris backdoor to a Kazakhstan-based threat actor it tracks as Storm-0473. Subsequent reports from Cisco Talos, Seqrite Labs, Group-IB, and BI.ZONE have strengthened this hypothesis, with the analyses identifying overlaps with clusters referred to as Cavalry Werewolf, ShadowSilk, Silent Lynx, SturgeonPhisher, and YoroTrooper. The latest activity documented by Kaspersky begins with phishing emails containing malicious password-protected RAR files. The password to open the archive is included in the text of the email. Present within the file is an executable masquerading as a Microsoft Word document (*.doc.exe) that, when launched, drops a C/C++ reverse shell that's responsible for gathering system information and contacting a C2 server to fetch AdaptixC2. The reverse shell also makes Windows Registry modifications to ensure persistence for the downloaded payload. Three different versions of the malware have been detected this year alone. Alternatively, the RAR archives propagated via the emails have been found to deliver other malware families, which, in turn, trigger their own infection sequences - Tomiris' malware arsenal also comprises a number of reverse shells and implants written in different programming languages - "The Tomiris 2025 campaign leverages multi-language malware modules to enhance operational flexibility and evade detection by appearing less suspicious," Kaspersky said. "The evolution in tactics underscores the threat actor's focus on stealth, long-term persistence, and the strategic targeting of government and intergovernmental organizations."
Daily Brief Summary
Tomiris, a threat actor, has targeted foreign ministries and government entities in Russia using public services like Telegram and Discord for command-and-control operations.
This tactic aims to disguise malicious traffic as legitimate service activity, complicating detection by security tools.
Over 50% of spear-phishing emails used Russian names and text, indicating a focus on Russian-speaking targets, with additional campaigns in Central Asian countries.
Attacks utilize reverse shells, custom implants, and open-source C2 frameworks to facilitate post-exploitation, enhancing operational flexibility.
Tomiris is linked to the Kazakhstan-based threat actor Storm-0473, with overlaps identified with other threat clusters such as Cavalry Werewolf and Silent Lynx.
Phishing emails deliver malicious RAR files containing executables that drop reverse shells, modify Windows Registry, and ensure persistence.
The campaign's evolution reflects a focus on stealth, persistence, and strategic targeting of high-value political and diplomatic infrastructure.