ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

What a Major Real Estate Firm’s Encounter with Tuoni C2 Malware Reveals About Evolving Threats

Share blog icon

Back to top

Back to top

January 29, 2026

What a Major Real Estate Firm’s Encounter with Tuoni C2 Malware Reveals About Evolving Threats

Adversaries are abandoning traditional file-based attacks to bypass modern defenses.

A cyberattack targeting a major U.S. real estate firm recently put this shift on full display, with the firm narrowly stopping a potentially devastating ransomware incident.

The breach started with social engineering: attackers impersonated trusted colleagues on Microsoft Teams to trick employees into executing a malicious PowerShell command.

This command bypassed the disk entirely, launching a hidden background process via the Tuoni framework — a C2 platform used to deploy memory-resident malware that leaves traditional scanners in the dark.

The Tuoni Framework: Stealth by Design

By functioning entirely in RAM, memory-resident (or fileless) malware bypasses legacy security tools that focus on file-based threats. Because there is no physical footprint to scan, attackers can infiltrate and operate within a network while remaining invisible to traditional detection methods.

While memory-resident malware is able to bypass local security, it still requires network access for command-and-control and data theft. Because this traffic is a potential giveaway, Tuoni conceals its activity with:

  • Protocol mimicry: It disguises unauthorized traffic as trusted HTTP/HTTPS, DNS, or SMB, ensuring malicious communication blends seamlessly with routine web browsing.
  • Persistent remote control: It establishes a stable, invisible foothold that maintains a long-term C2 connection between the attacker and the compromised environment.
  • Dynamic payload execution: It enables threat actors to deploy and run additional malware on-demand, adapting the attack in real-time.

To achieve this fileless state, the framework relies on AI-enhanced loaders and steganography to hide its secondary stage. Malicious shellcode is embedded within the pixels of a BMP image file, which traditional scanners ignore as harmless media.

Once the PowerShell script extracts this code it loads the TuoniAgent.dll directly into RAM. This process ensures the malware never touches the physical disk thereby hiding from signature-based antivirus and EDR tools that can only scan static files.

The Network as an Immutable Record

Threat actors weaponize tools like Tuoni to hide in plain sight on the network, evading signature-based controls. But imitation is imperfect. Even when traffic looks normal, its behavior often isn’t.

Command-and-control activity introduces detectable inconsistencies: unusual request cadences, atypical protocol usage, abnormal data volumes, and outbound connections that don’t align with expected application behavior.

These signals persist at the network layer, even when malware remains memory-resident, and endpoint defenses see nothing. By continuously analyzing network behavior rather than relying on known indicators, security teams can expose and disrupt memory-resident threats — closing the gap that attackers rely on to operate undetected.

Learn more about the latest attacker trends and how network visibility uncovers stealthy threats in the Global Threat Landscape Report.

blog image

ExtraHop is on a mission to arm security teams to confront active threats and stop breaches. Our RevealX™ 360 platform, powered by cloud-scale AI, covertly decrypts and analyzes all cloud and network traffic in real time to eliminate blind spots and detect threats that other tools miss. Sophisticated machine learning models are applied to petabytes of telemetry collected continuously, helping ExtraHop customers to identify suspicious behavior and secure over 15 million IT assets, 2 million POS systems, and 50 million patient records. ExtraHop is a market share leader in network detection and response with 30 recent industry awards including Forbes AI 50, Cybercrime Ransomware 25, and SC Media Security Innovator.

Learn more at our About Us page.

Share
LinkedIn logoX logoFacebook logo

Explore related articles

Experience RevealX NDR for Yourself

Schedule a demo