Threat actors abuse high-performance bots to carry out large-scale automated attacks efficiently.
These bots can work quickly, flood systems, steal information, and conduct and orchestrate sophisticated cyber operations largely autonomously.
Cybersecurity researchers at ASEC recently discovered that Bondnet has used high-performance bots for C2 servers.
Bondnet, a threat actor deploying backdoors and cryptocurrency miners since 2017, was still finding new approaches.
The ASEC researchers noted that Bondnet configures reverse RDP environments on fast stolen systems using them as C2 servers.
Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot
It meant modifying an open-source, fast reverse proxy (FRP) tool embedding the threat actor’s proxy server information.
This included setting up an FRP-based reverse RDP environment, whereby Bondnet ran various programs onto the targets, like the Cloudflare tunneling client, for remote access, ensuring that they remained vigilant about keeping hold of compromised valuables.
Cloudflare tunneling client is one of the attempts Bondnet threat actors used to connect a service on the compromised target with their C2 domain after registering a C2 domain on Cloudflare.
One of the applications executed was HFS, which provided a file server service on TCP port 4000. The software’s architecture resembled this threat actor’s Command and Control infrastructure.
The HFS Golang program encountered environmental issues, which made it impossible to observe how the system could have been changed into a command-and-control one.
However, strong evidence indicates that Bondnet wished to exploit high-speed compromised systems as part of their C2 infrastructure via this tunneling means.
Bondnet, a threat actor, linked compromised targets with the Cloudflare tunneling client and HFS program to associate system services with the Cloudflare-hosted C2 domain.
They might have intended to convert high-performance bots into their C2 infrastructure via reverse RDP connections.
No data exfiltration or lateral movement was detected, although similarities between the HFS program UI and the actor’s C2 suggested its expected use.
During analysis of this system, it turned out that the HFS program did not work properly.
Some months later, the actors’ C2 UI changed, with new malicious files appearing and those that were deleted previously being restored, suggesting that they may have used another compromised bot using different tooling after facing issues while turning the initial target into a C2 node.
MD5s
URLs And C2s
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free
A significant vulnerability in the Linux kernel's Virtual Socket (vsock) implementation, designated as CVE-2025-21756, has…
Cybersecurity researchers have uncovered a concerning cache of hacking tools, including SuperShell payloads and Cobalt…
The Apache Software Foundation disclosed a significant security vulnerability in Apache Tomcat that could allow…
The Cybersecurity and Infrastructure Security Agency (CISA) has added the Commvault Web Server vulnerability (CVE-2025-3928)…
Kali Linux users worldwide are facing an imminent disruption as the security-focused distribution has announced…
In a significant shift observed during the first quarter of 2025, cybersecurity experts have documented…