Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Russia's Sophisticated Cyberattacks: Unpacking the Tuoni C2 Framework and its Role in Real-Estate Hacking


Researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of the Tuoni C2 framework. The attack demonstrates how AI-powered tools are being used to accelerate and simplify vulnerability exploitation, highlighting the importance of staying vigilant in today's cybersecurity landscape.

  • The Tuoni C2 framework was allegedly used in a real-estate cyber intrusion in October 2025.
  • The framework is a relatively new command-and-control (C2) tool with advanced features and capabilities.
  • The attack involved social engineering via Microsoft Teams impersonation to gain initial access to the targeted company.
  • The attackers downloaded a second PowerShell script that employed steganographic tricks to conceal the next-stage payload.
  • The attack highlights the potential risks of using red teaming frameworks for malicious purposes and the importance of robust security measures.
  • The Tuoni C2 framework demonstrates how AI-powered tools are being used to accelerate and simplify vulnerability exploitation.



  • The world of cybersecurity is constantly evolving, with new threats emerging every day. In recent times, we have witnessed a significant escalation in the sophistication of cyber attacks. One such attack that has gained attention from cybersecurity experts is the Tuoni C2 framework, which was allegedly used in an attempted real-estate cyber intrusion in October 2025. This article will delve into the details of this attack and explore how the Tuoni C2 framework played a crucial role in it.

    The Tuoni C2 framework is a relatively new command-and-control (C2) tool that has gained significant attention among cybersecurity professionals due to its advanced features and capabilities. According to Morphisec researcher Shmuel Uzan, the Tuoni C2 framework leveraged an emerging C2 tool with a free license that delivers stealthy, in-memory payloads. The framework is designed for security professionals, facilitating penetration testing operations, red team engagements, and security assessments.

    However, what caught attention was the attack carried out by an unknown threat actor who likely leveraged social engineering via Microsoft Teams impersonation to gain initial access to a U.S.-based real-estate company. This attack demonstrates how attackers are increasingly using social engineering tactics to breach organizations' defenses.

    Once inside the system, the attacker downloaded a second PowerShell script from an external server called "kupaoquan[.]com," which employed steganographic tricks to conceal the next-stage payload within a bitmap image (BMP). The primary goal of this embedded payload was to extract shellcode and execute it directly in memory. This results in the execution of "TuoniAgent.dll," which corresponds to an agent that operates within the targeted machine and connects to a C2 server, allowing for remote control.

    While the Tuoni itself is considered a sophisticated but traditional C2 framework, the delivery mechanism showed signs of AI assistance in code generation, evident from the scripted comments and modular structure of the initial loader. This demonstrates how AI-powered tools are increasingly being used to accelerate and simplify vulnerability exploitation.

    The attack carried out by the attackers not only highlights the potential risks associated with using red teaming frameworks for malicious purposes but also serves as a warning to organizations about the importance of monitoring their systems for suspicious activity. It is essential for companies to maintain robust security measures in place, including regular software updates, employee training on cybersecurity best practices, and continuous system monitoring.

    Furthermore, this attack underscores the importance of keeping abreast of emerging threats and vulnerabilities. The Tuoni C2 framework is a relatively new tool that has gained significant attention due to its advanced features and capabilities. As such, it is essential for organizations to stay informed about the latest threat intelligence and take necessary precautions to protect themselves against these types of attacks.

    In conclusion, the attack carried out by an unknown threat actor using the Tuoni C2 framework highlights the evolving nature of cyber threats and the importance of staying vigilant. As AI-powered tools continue to play a significant role in vulnerability exploitation, it is essential for organizations to maintain robust security measures in place and stay informed about emerging threats.

    Researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of the Tuoni C2 framework. The attack demonstrates how AI-powered tools are being used to accelerate and simplify vulnerability exploitation, highlighting the importance of staying vigilant in today's cybersecurity landscape.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Russias-Sophisticated-Cyberattacks-Unpacking-the-Tuoni-C2-Framework-and-its-Role-in-Real-Estate-Hacking-ehn.shtml

  • https://thehackernews.com/2025/11/researchers-detail-tuoni-c2s-role-in.html

  • https://www.sepe.gr/en/it-technology/cybersecurity/22655403/researchers-detail-tuoni-c2-s-role-in-an-attempted-2025-real-estate-cyber-intrusion/


  • Published: Tue Nov 18 09:34:50 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us