Sunday, May 18, 2025
Homecyber securityTsunami Malware Surge: Blending Miners and Credential Stealers in Active Attacks

Tsunami Malware Surge: Blending Miners and Credential Stealers in Active Attacks

Published on

SIEM as a Service

Follow Us on Google News

Security researchers have recently discovered a sophisticated malware operation called the “Tsunami-Framework” that combines credential theft, cryptocurrency mining, and potential botnet capabilities.

The framework employs advanced evasion techniques to bypass security measures and maintain persistent access to infected systems.

Analysis of the framework indicates it may still be in testing phases, but already demonstrates concerning capabilities that could pose significant risks to organizations and individuals.

- Advertisement - Google News

The Tsunami-Framework achieves initial system access through a malicious loader called “BeaverTail-Payload,” delivered via third-party domains and private GitHub repositories.

Once executed, this loader deploys “InvisibleFerret” malware that establishes multiple persistence mechanisms across the target system.

The framework installs components with legitimate-sounding names such as “Windows Update Script.pyw” in Windows startup folders and “Runtime Broker.exe” in application directories.

To ensure continued operation, Tsunami creates scheduled tasks that activate when users log in and systematically disables security protections by adding numerous Windows Defender exclusions for its components.

The malware also configures Windows Firewall rules allowing its modules to communicate freely, often disguising its traffic under legitimate names like “Microsoft Edge WebEngine”.

Before fully activating, the malware lies dormant for periods of 1-5 minutes, helping it evade immediate detection by security monitoring tools.

Key technical details of the persistence and evasion mechanisms:

  • Installs “Windows Update Script.pyw” in the Startup folder for automatic execution at logon
  • Drops “Runtime Broker.exe” in the Applications directory and adds it to Windows Defender exclusions
  • Uses PowerShell scripts to create scheduled tasks for secondary persistence
  • Adds multiple Windows Defender and Firewall exclusions for its components, including: Startup scripts, Application executables, System dependencies, Common browser executables.
  • Implements firewall rules under the guise of “Microsoft Edge WebEngine” to allow network traffic
  • Sleeps for 1 or 5 minutes depending on the presence of a specific flag file, delaying full activation to avoid detection

Extensive Theft Capabilities and Command Infrastructure

Tsunami delivers an impressive array of malicious modules designed to extract valuable data from infected systems.

These include specialized credential stealers targeting multiple browsers (Chrome, Firefox, Edge, Opera GX, and Brave), cryptocurrency wallet theft tools, keyloggers, and a recently developed “SecretFileStealer” module that exfiltrates specific files of interest.

For covert communications, the framework deploys a Tor client and connects to a command-and-control server hosted at an onion domain, making traffic analysis extremely difficult.

Through multiple API endpoints, the malware can receive instructions and transmit stolen data while remaining hidden from conventional network monitoring.

Additionally, the framework includes cryptocurrency mining functionality with XMRig software configured to mine Monero, suggesting financial motivation behind the operation.

Detection Methods and Security Recommendations

Security researchers have developed specialized YARA rules to detect Tsunami framework components across networks.

These detection signatures identify specific code patterns and communication endpoints associated with the malware, providing defenders with tools to identify infections.

The rule targets unique strings embedded in the malware, including API endpoints and encoded URLs used for command and control.

Organizations should implement these detection rules and monitor systems for suspicious activities such as unexpected Windows Defender exclusions, unusual scheduled tasks, and unauthorized modifications to firewall rules.

Security teams should pay particular attention to applications mimicking legitimate Windows processes like “Runtime Broker” appearing in non-standard locations.

Given indications that this malware framework remains under active development, cybersecurity teams should prepare for potential new variants with expanded capabilities in the future.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...