top of page
perceptive_background_267k.jpg

Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets

Published:

1 december 2025 om 05:07:00

Alert date:

5 december 2025 om 08:03:22

Source:

thehackernews.com

Click to open the original link from this advisory

The Tomiris threat actor has been conducting attacks against foreign ministries, intergovernmental organizations, and government entities in Russia. The campaign demonstrates a tactical shift toward using implants that leverage public services like Telegram and Discord for command and control communications. This approach allows for stealthier operations by blending malicious traffic with legitimate service communications. The attacks aim to establish remote access and deploy additional tools on compromised systems. The use of public platforms represents an evolution in the group's operational security practices.

Technical details

Mitigation steps:

Affected products:

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page