Home » Technology » Title: Researchers Detail Tuoni C2’s Role in 2025 Real-Estate Cyber Intrusion

Title: Researchers Detail Tuoni C2’s Role in 2025 Real-Estate Cyber Intrusion

by Rachel Kim – Technology Editor

Emerging​ Red Team tool Tuoni ⁢C2 Used in Attempted Breach ‌of US Real Estate Firm

October 26, 2025 – A⁤ US-based real estate firm was targeted ​in mid-October by a cyberattack leveraging the recently released Tuoni‌ command-and-control (C2)⁤ framework, researchers at Morphisec revealed today. ​The incident highlights a growing trend of malicious ​actors adopting tools originally designed for legitimate penetration testing and red team exercises.

Tuoni, advertised as an ⁢advanced C2 framework for security professionals, became freely available as a “Community ‌Edition” download from GitHub ​in early ‍2024. ⁣The attackers in ‌this case ⁣utilized Tuoni’s ability to deliver stealthy,‍ in-memory payloads. ⁣According to Shmuel Uzan, a Morphisec researcher, ​”The campaign leveraged the emerging Tuoni C2 framework…that delivers stealthy, in-memory payloads.”

The ​attack unfolded through a likely social engineering scheme involving Microsoft Teams impersonation, where attackers allegedly posed as trusted vendors or colleagues to trick an employee into executing a PowerShell command. This command downloaded ⁣a second powershell script from⁣ “kupaoquan[.]com,” which concealed a further payload within a bitmap image using steganographic techniques. The resulting execution of “TuoniAgent.dll” established a connection to the C2 server, granting the attackers potential remote control of the compromised machine.

Morphisec noted potential signs ⁤of AI assistance in the initial loader’s code generation, citing scripted comments and a modular structure. This incident⁢ follows a ⁣September 2025 report from Check Point detailing the weaponization of AI-powered tool HexStrike AI for accelerated vulnerability exploitation, further illustrating the evolving landscape of⁤ cyber threats. While the attack on the real estate ‌firm was ultimately unsuccessful, it ⁤underscores the increasing misuse of legitimate security tools for malicious purposes.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.