The Hacker News reports that peer-to-peer instant messaging service Tox is now being used by threat actors as a command-and-control server instead of just a tool for communicating with victims in ransomware negotiations.
Such Tox utilization was discovered by Uptycs researchers after the identification of the '72client' Executable and Linkable Format artifact with bot and script execution functionality on compromised systems using Tox.
The report showed that the C-based binary was associated with the c-toxcore library, a reference implementation of Tox. Researchers also found that cryptominer-related processes could be killed by commands launched by a shell script within the ELF file. Different commands could also be received using Tox, which could also be quitted through an 'exit' command.
"While the discussed sample does not do anything explicitly malicious, we feel that it might be a component of a coinminer campaign. Therefore, it becomes important to monitor the network components involved in the attack chains," said researchers.
Ransomware, Threat Management
Tox messenger leveraged as C2 server in new attack
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds