New Rust-Based ChaosBot Backdoor and Aggressive Chaos-C++ Ransomware Threaten Enterprises

New Rust-Based ChaosBot Backdoor and Aggressive Chaos-C++ Ransomware Threaten Enterprises

Cybersecurity researchers have uncovered a sophisticated new Rust-based backdoor named ChaosBot, capable of conducting reconnaissance and executing arbitrary commands on compromised systems. The malware was first detected in late September 2025 within a financial services environment, according to Canadian cybersecurity firm eSentire.

“Threat actors leveraged compromised credentials that mapped to both Cisco VPN and an over-privileged Active Directory account named, ‘serviceaccount,'” eSentire said in a technical report published last week. “Using the compromised account, they leveraged WMI to execute remote commands across systems in the network, facilitating the deployment and execution of ChaosBot.”

ChaosBot is notable for its use of Discord as a command-and-control (C2) channel. The malware receives instructions from a Discord profile maintained by the threat actor using the alias “chaos_00019,” with a second account, lovebb0024, also linked to operations. It can also spread through phishing messages containing a malicious Windows shortcut (LNK) file, which triggers a PowerShell command to download and execute ChaosBot while displaying a decoy PDF. Once deployed, it sideloads a malicious DLL, “msedge_elf.dll,” via Microsoft Edge’s “identity_helper.exe,” performs system reconnaissance, and downloads a fast reverse proxy to maintain persistent access.

“New variants of ChaosBot make use of evasion techniques to bypass ETW [Event Tracing for Windows] and virtual machines,” eSentire said. The malware patches instructions in ntdll!EtwEventWrite and checks MAC addresses against known VMware and VirtualBox prefixes to avoid detection. Supported commands include executing shell commands, capturing screenshots, and transferring files to and from Discord channels.

In a related threat, Fortinet FortiGuard Labs detailed a new Chaos-C++ ransomware variant that introduces destructive file deletion and clipboard hijacking for cryptocurrency theft. “This dual strategy of destructive encryption and covert financial theft underscores Chaos’ transition into a more aggressive and multifaceted threat designed to maximize financial gain,” the company said. The ransomware, distributed under the guise of utilities like System Optimizer v2.1, targets files smaller than 50 MB for encryption, deletes files over 1.3 GB, and swaps Bitcoin addresses in clipboard content to redirect transactions.

“Rather than relying solely on full file encryption, Chaos-C++ employs a combination of methods, including symmetric or asymmetric encryption and a fallback XOR routine,” Fortinet said. The malware also ensures successful execution via a versatile downloader, making both ChaosBot and Chaos-C++ robust and difficult to disrupt, posing significant threats to enterprises worldwide.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch