A new malware is alarming cybersecurity experts: ChaosBot, a backdoor written in Rust that uses Discord as its command‑and‑control (C2) channel. Alongside it, an even more dangerous evolution of the Chaos ransomware, now featuring file‑destruction and clipboard hijacking, has emerged.
According to reports from eSentire and Fortinet, these threats reveal a growing ecosystem that blends credential theft, social engineering, reverse tunneling, and advanced evasion techniques.
At TecnetOne, we explain how this attack works, why it’s especially dangerous, and how you can defend your organization.
ChaosBot is a Rust‑based backdoor first detected in September 2025 within a financial services firm.
It allows attackers to execute remote commands, steal files, and maintain persistent access to compromised systems.
Initial access typically comes through stolen or misconfigured credentials. In one observed case, the attackers used an overprivileged Active Directory account and compromised VPN credentials, deploying the malware via WMI (Windows Management Instrumentation).
Other variants spread through phishing emails with malicious .LNK shortcuts that launch PowerShell commands, downloading the payload from external servers while showing a decoy PDF, such as a fake “State Bank of Vietnam” notice.
ChaosBot is technically sophisticated and blends seamlessly with legitimate Windows processes.
Key capabilities include:
In essence, ChaosBot is a remote‑access espionage tool disguised as legitimate software—capable of lateral movement and stealthy data exfiltration.
Read more: APT36 Hackers Use .desktop Files on Linux to Spread Malware
While ChaosBot serves as the reconnaissance and access tool, the Chaos‑C++ ransomware delivers the destructive blow.
According to Fortinet FortiGuard Labs, this upgraded variant merges encryption, file deletion, and clipboard hijacking to maximize damage.
Most destructive features:
This evolution shows that Chaos‑C++ aims not only to extort but to cause irreversible loss, amplifying pressure on victims.
ChaosBot and Chaos‑C++ primarily target corporate networks with exposed services—VPNs, RDP, or admin accounts—and organizations lacking network segmentation.
Their use of Discord for C2 makes detection difficult since the traffic runs through a legitimate platform.
Techniques like DLL sideloading and malicious LNK phishing remain highly effective, especially against untrained users.
Attack Chain diagram (Source: esentire.com)
These campaigns can devastate victims within hours, leading to:
The combination of espionage (ChaosBot) and destruction (Chaos‑C++) forms a hybrid attack that merges ransomware, trojans, and advanced persistence.
Similar titles: How and where do hackers hide their malware code?
At TecnetOne, we recommend a defense‑in‑depth approach combining access control, technical safeguards, and employee awareness.
Early detection is crucial. Look for:
If any indicators appear, isolate affected devices, perform forensic analysis, and review remote‑access logs (WMI, RDP, VPN).
ChaosBot and Chaos‑C++ represent a new generation of modular malware—intelligent, destructive, and engineered to evade detection.
Their abuse of legitimate channels like Discord and their advanced persistence mechanisms make them formidable threats.
The best defense is anticipation: reinforce identity controls, monitor networks in real time, and educate your teams on early detection.
At TecnetOne, we help organizations prevent, detect, and respond to complex threats like ChaosBot through adaptive, intelligence‑driven cybersecurity.
Because today, cybersecurity isn’t just about protecting systems—it’s about protecting business continuity.