The Advanced Persistent Threat (APT) group known as Tomiris has launched a new series of highly targeted cyber-espionage campaigns in 2025, refining its tools and techniques to enhance stealth. According to a report by Kaspersky, the group is targeting foreign ministries and government bodies in Russia and several Commonwealth of Independent States (CIS) countries, including Turkmenistan, Kyrgyzstan, Tajikistan, and Uzbekistan. A key evolution in their tactics is the use of legitimate public services, specifically Discord and Telegram, for command-and-control (C2) communications. This allows the group to blend its malicious traffic with legitimate network activity, complicating detection efforts. The campaign's goal remains long-term intelligence gathering from high-value diplomatic targets.
Tomiris continues to rely on spear-phishing as its initial access vector, using emails with content carefully crafted in Russian and other national languages to appear legitimate to its targets. These emails deliver a diverse range of malware payloads.
The group's updated toolkit includes:
The most notable tactical shift is the adoption of Discord and Telegram for C2. By using the APIs of these popular services, the malware can send and receive commands and exfiltrate data over standard, encrypted HTTPS connections, making it difficult for network security tools to distinguish from benign user activity.
Tomiris's TTPs demonstrate a focus on stealth, persistence, and adaptability.
T1566.001 - Spearphishing Attachment: The use of tailored emails with malicious attachments to gain initial access.T1071.001 - Web Protocols: The core of their new C2 strategy. Using Discord and Telegram APIs for C2 communication over HTTPS.T1105 - Ingress Tool Transfer: After initial access, the first-stage payload downloads further tools like backdoors and file grabbers.T1059 - Command and Scripting Interpreter: The use of reverse shells in various scripting languages (Python, Go) for execution.T1005 - Data from Local System: The 'FileGrabber' malware is used to collect documents from the compromised host.T1573.001 - Symmetric Cryptography: Traffic to Discord/Telegram is encrypted by default (TLS), which is a form of encrypted C2 channel.The use of legitimate public services for C2 is a growing trend among APTs. It offloads infrastructure management to reputable providers and makes blocking C2 traffic challenging, as blocking all of Discord or Telegram is not feasible for most organizations.
The impact of this campaign is focused on espionage and intelligence theft. By targeting diplomatic and government entities, Tomiris aims to steal sensitive state secrets, including political strategies, negotiation positions, and classified documents. A successful breach can provide the group's sponsors with a significant strategic advantage in international relations. The long-term persistence achieved through stealthy C2 channels means that the targeted organizations could be compromised for extended periods, leading to a continuous drain of sensitive information.
Detecting C2 over legitimate services requires looking for subtle anomalies.
| Type | Value | Description |
|---|---|---|
| network_traffic_pattern | discord.com/api or api.telegram.org |
Monitor for connections to these API endpoints from unusual processes (e.g., a standalone executable in TEMP folder) or from servers that should not be running chat clients. |
| network_traffic_pattern | High-frequency, small data packets | Look for beaconing behavior to these services, characterized by regular, small data transfers, which is indicative of C2 heartbeats. |
| process_name | Unusual process names making web requests | An unknown or strangely named process (doc_viewer.exe) making API calls to Discord is highly suspicious. |
| command_line_pattern | curl or wget to Discord/Telegram |
Command-line execution of tools to download payloads from or exfiltrate data to these services. |
Network Traffic Analysis.discord.com or telegram.org, block it. This is D3FEND's Outbound Traffic Filtering.Response: If a compromise is detected, the C2 channel must be blocked at the firewall. The infected host should be isolated, and a forensic analysis should be performed to identify all malware components. All credentials on the host must be considered compromised and rotated.
Executable Denylisting.Blocking access to non-essential web services like Discord and Telegram from sensitive government networks can prevent this C2 technique from working.
Mapped D3FEND Techniques:
Decrypting outbound TLS traffic allows for the inspection of C2 communications, even when they are hidden within legitimate services.
Mapped D3FEND Techniques:
Training high-value diplomatic targets to recognize and report sophisticated spear-phishing emails is a critical defense against the initial access vector.
Implement a default-deny egress filtering policy on firewalls protecting sensitive government networks. Explicitly block connections to the domains and APIs of public services like Discord and Telegram (discord.com, api.telegram.org) from all servers and workstations that do not have a specific business requirement for them. This is the most effective way to neutralize the Tomiris group's updated C2 strategy. While the APT can pivot to other services, this forces them to retool and disrupts ongoing operations. For organizations where these services are used, filtering should be more granular, allowing access only from specific user groups or devices.
Deploy TLS/SSL inspection on network egress points to gain visibility into the encrypted C2 traffic. While this can be resource-intensive, it is essential for detecting threats that abuse legitimate services. Once traffic is decrypted, look for indicators of C2 behavior, such as non-browser user agents connecting to Discord's API, periodic beaconing with small payloads, or large, unexplained data uploads to these services. Correlating network data with endpoint process information (e.g., a custom backdoor process initiating the connection) will provide high-confidence alerts.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats