Code Defence Cyber security

Tomiris APT Upgrades Toolkit: Uses Telegram & Discord for Stealth C2

A new intelligence report reveals that the “Tomiris” cyber-espionage group (linked to Russian-speaking actors) has significantly upgraded its tactics targeting government and diplomatic entities in Central Asia. The group is now routing command-and-control (C2) traffic through legitimate services like Telegram and Discord to blend in with normal network noise.

Business Impact

This “living-off-the-land” network strategy makes detection extremely difficult for traditional firewalls, which typically allow traffic to these popular collaboration apps. Successful espionage campaigns can lead to the theft of highly sensitive diplomatic cables, negotiation strategies, and personnel data.

Why It Happened

APT groups are adapting to improved perimeter defenses. By using trusted, high-reputation domains (like Discord) for malware communication, they bypass blocklists and anomaly detection systems that would normally flag connections to unknown servers.

Recommended Executive Action

Direct your SOC to review network logs for anomalous traffic patterns to legitimate collaboration tools, especially from critical server subnets. Consider restricting access to Discord/Telegram on sensitive government or executive networks unless strictly necessary.

Hashtags: #Tomiris #APT #Espionage #Russia #C2 #Discord #Telegram #CyberSecurity #InfoSec

Scroll to Top

Review My Order

0

Subtotal