A dangerous new malware strain, dubbed ChaosBot, is raising alarms in the cybersecurity community for its use of novel techniques, including leveraging Discord channels for command and control (C2).
Written in the Rust programming language, ChaosBot is a stealthy backdoor that allows attackers to issue remote instructions to compromised systems, according to research by eSentire’s Threat Response Unit. The discovery highlights the escalating sophistication of threat actors and the need for more adaptive defense strategies.
First detected in a financial services environment in late September 2025, ChaosBot’s initial access was gained through compromised credentials for a Cisco VPN and an over-privileged Active Directory account. This access allowed attackers to use Windows Management Instrumentation (WMI) to execute commands remotely and distribute the malware across the network.
The operators behind ChaosBot, identified by Discord aliases like “chaos_00019” and “lovebb0024,” use Discord channels to communicate with infected machines, allowing them to issue commands such as:
In other observed cases, attackers deliver the malware through phishing emails containing a malicious Windows shortcut (.LNK) file.
When opened, the LNK file executes a PowerShell script to fetch and run ChaosBot. All while displaying a benign-looking PDF as a decoy.
Once active, ChaosBot uses several advanced techniques to evade detection:
ChaosBot is part of a larger, evolving threat landscape. The broader Chaos ransomware family, from which ChaosBot likely derives, has also been observed in newer, more destructive variants.
A C++ version of Chaos ransomware can delete large files rather than just encrypting them. It can also hijack the clipboard to swap cryptocurrency addresses, intensifying the financial risk for victims.
Traditional, signature-based security tools are largely ineffective against such sophisticated and evasive malware. Cybersecurity experts recommend a layered defense that prioritizes behavioral monitoring over static signatures. Recommended strategies include:
As malware authors continue to innovate, defenders must move beyond conventional assumptions. We need more focus on resilient, adaptive security measures to protect against the next wave of advanced threats.