Original Article Text

Click to Toggle View

Initial access hackers switch to Tsundere Bot for ransomware attacks. A prolific initial access broker tracked as TA584 has been observed using the Tsundere Bot alongside XWorm remote access trojan to gain network access that could lead to ransomware attacks. Proofpoint researchers have been tracking TA584's activity since 2020 and say that the threat actor has significantly increased its operations recently, introducing a continuous attack chain that undermines static detection. Tsundere Bot was first documented by Kaspersky last year and attributed to a Russian-speaking operator with links to the 123 Stealer malware. Although the goals and infection method remained murky at the time, Proofpoint says that "the malware can be used for information gathering, data exfiltration, lateral movement, and to install additional payloads." “Given that Proofpoint has observed this malware used by TA584, researchers assess with high confidence Tsundere Bot malware infections could lead to ransomware,” the researchers note. TA584 activity in late 2025 tripled in volume compared to Q1 of the same year and expanded beyond the standard targeting scope of North America and the UK/Ireland to include Germany, various European countries, and Australia. The currently prevalent attack chain begins with emails sent from hundreds of compromised, aged accounts, delivered via SendGrid and Amazon Simple Email Service (SES). The emails include unique URLs for each target, geofencing and IP filtering, and a mechanism of redirect chains often involving third-party traffic direction systems (TDS) like Keitaro. Those who pass the filters will land on a CAPTCHA page, followed by a ClickFix page instructing the target to run a PowerShell command on their system. The command fetches and executes an obfuscated script, loads either XWorm or Tsundere Bot into memory, and redirects the browser to a benign site for deception. Proofpoint says TA584 has used a large number of payloads over the years, including Ursnif, LDR4, WarmCookie, Xeno RAT, Cobalt Strike, and DCRAT, which was still seen in one case in 2025. Tsundere Bot is a malware-as-a-service platform with backdoor and loader capabilities. It requires Node.js to operate, which the malware adds to the victim system using installers generated from its command-and-control panel. The malware retrieves its command-and-control (C2) address from the Ethereum blockchain using a variant of the EtherHiding technique, with a hardcoded fallback address also included in the installer. It communicates with its C2 servers over WebSockets and includes logic to check the system locale, aborting execution if the system is using Commonwealth of Independent States (CIS) country languages (primarily Russian). Tsundere Bot collects system information to profile infected machines, can execute arbitrary JavaScript code received from the C2, and supports using infected hosts as SOCKS proxies. The malware platform also features a built-in market where bots can be sold and purchased. The researchers expect TA584 to attempt a broader range of targets and believe that the threat actor will keep experimenting with various payloads. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.

Daily Brief Summary

MALWARE // TA584 Expands Operations Using Tsundere Bot for Ransomware Attacks

TA584, an initial access broker, has adopted the Tsundere Bot and XWorm trojan to facilitate network access potentially leading to ransomware incidents.

Proofpoint researchers have monitored TA584 since 2020, noting a recent surge in activity and a sophisticated attack chain that challenges static detection methods.

Tsundere Bot, linked to Russian-speaking operators, enables data exfiltration, lateral movement, and additional payload installation, posing a significant threat.

The attack chain involves emails from compromised accounts via SendGrid and Amazon SES, directing targets through geofenced and IP-filtered URLs to execute malicious PowerShell commands.

Tsundere Bot operates as malware-as-a-service, utilizing Node.js and retrieving command-and-control addresses from the Ethereum blockchain, with fallback options embedded.

The malware aborts execution in CIS countries, collects system data, executes JavaScript from C2, and uses infected systems as SOCKS proxies.

TA584's expanded targeting now includes Germany, other European countries, and Australia, with expectations of further payload experimentation.

Organizations should enhance email security measures and monitor for unusual network activity to mitigate risks associated with this evolving threat.