Sunday, April 13, 2025
HomeCyber Security NewsTorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Published on

SIEM as a Service

Follow Us on Google News

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a previously undocumented backdoor known as “TorNet.”

This operation, believed to be orchestrated by a financially motivated threat actor, predominantly targets users in Poland and Germany through phishing emails.

TorNet Backdoor
Sample phishing email in Polish. 

The emails, disguised as financial or logistics communications, aim to deceive recipients into executing malicious attachments, initiating the infection.

- Advertisement - Google News

The attackers employ PureCrypter malware as a delivery mechanism, leveraging compressed email attachments to bypass detection.

Once executed, PureCrypter decrypts and loads the TorNet backdoor directly into the memory, bypassing traditional file-based detection systems.

The infection chain includes additional payloads, such as Agent Tesla and Snake Keylogger, exposing victims to extensive compromise.

The attackers disconnect the victim’s machine from the network during payload deployment, minimizing the chance of detection by cloud-based antimalware solutions.

The TorNet backdoor further enhances stealth by establishing connections to command-and-control (C2) servers via the TOR network, anonymizing communications and complicating traceability.

PureCrypter modifies system settings, creates scheduled tasks, and even accounts for power constraints, ensuring the infection persists on systems operating on low battery.

The malware uses obfuscation techniques, such as Eziriz’s .NET Reactor, to hinder reverse engineering.

Anti-debugging, anti-virtualization, and other anti-analysis features are also integrated, preventing malware detection in sandbox environments.

Expanded Attack Surface Through TorNet Backdoor

The TorNet backdoor stands out for its capability to load arbitrary .NET assemblies sent by the C2 server, significantly increasing risks of further exploitation.

The malware encodes communication using encryption protocols, adding layers of obfuscation to its activities.

During examination, researchers observed connections to IP addresses via specific ports, indicating active C2 communication.

However, the backdoor also introduces a new dimension of stealth by routing all network traffic through the TOR architecture, further anonymizing its interactions.

TorNet Backdoor
Network traffic showing the encrypted PureCrypter malware downloaded from the hosting site. 

The presence of TorNet represents a major escalation in malicious capabilities, as it empowers attackers to inject new payloads dynamically, potentially facilitating data exfiltration, ransomware deployment, or other malicious activities.

Defensive Measures

Organizations are urged to adopt layered defense mechanisms to counter this evolving threat.

Tools like Cisco Secure Endpoint, Cisco Secure Email, and Umbrella are effective in detecting and mitigating such campaigns.

Additionally, advanced scanning and behavioral monitoring solutions can prevent initial infiltration through malicious email attachments.

Key indicators of compromise (IOCs) related to this campaign, including IP addresses, domains, and hashes, have been made available in the Cisco Talos GitHub repository.

As attackers continue to refine their techniques, proactive measures such as multi-factor authentication (e.g., Cisco Duo) and strict network monitoring are critical to minimizing exposure to this threat.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...