Tsundere Botnet Targets Windows Users with JavaScript Code

Cybersecurity researchers have identified an expanding botnet called Tsundere that targets Windows users. Active since mid-2025, the botnet executes arbitrary JavaScript code from a C2 server. The malware is spread through various means, including Remote Monitoring and Management (RMM) tools and lures for popular games. The botnet uses the Ethereum blockchain to fetch C2 server details, making it resilient. The threat actor behind Tsundere is believed to be Russian-speaking and has links to other malicious activities, including the 123 Stealer.

Latest mentioned: 11-20
Earliest mentioned: 11-20