Hackers incorporating emojis to control malware operations

Published:

spot_img

Hackers Using Emojis for Command and Control Communication: Disgomoji Malware Targeting Indian Government

Hackers are stepping up their game by using emojis as commands in their communication with command and control servers, a new report from cybersecurity firm Volexity reveals. Rather than typing out traditional commands, hackers are utilizing emojis like the ‘camera with flash’ to take screenshots on victims’ devices, the ‘fox’ to zip Firefox profiles, the ‘pointing finger’ to exfiltrate files, and the ‘skull’ to terminate malware processes.

In a recent incident in 2024, the Indian government fell victim to malware named Disgomoji, attributed to a suspected Pakistani threat actor known as UTA0137. The malware specifically targets Linux systems running the custom BOSS distribution used by the Indian government. Researchers believe that phishing attacks were used for initial access, with decoy documents serving as lures.

Disgomoji operates through Discord, creating dedicated channels for each victim to interact individually. The malware sends check-in messages with detailed system information and maintains persistence even after system reboots. Communication is conducted through an emoji-based protocol, with various emojis serving as commands.

The malware includes features like network scanning, tunneling, and exfiltration capabilities for espionage purposes. Volexity attributes this malicious activity to a Pakistan-based threat actor, citing evidence like hardcoded time zones, infrastructure links, language usage, and target organizations.

Despite efforts to disrupt its operations, Disgomoji has mechanisms to restore itself using updated Discord credentials from the C2 server. The malware poses a significant threat with its advanced capabilities and stealthy communication methods.

spot_img

Related articles

Recent articles

Thousands of Secrets Unveiled: Researchers Explore Code Formatting Tools

Recent research highlights a concerning issue regarding the security of sensitive information on code formatting platforms. Developers using tools like JSONFormatter and CodeBeautify may...

Massive Security Breach: Years of JSONFormatter and CodeBeautify Leaks Reveal Thousands of Passwords and API Keys

Nov 25, 2025Ravie LakshmananData Exposure / Cloud Security Significant Data Leaks from Popular Online Tools Recent findings have raised serious concerns about data security...

Alert: CVE-2025-65998 Exposes Apache Syncope Password Vulnerabilities

A Serious Vulnerability Found in Apache Syncope A new security vulnerability has been identified in Apache Syncope, a popular open-source identity management system. This flaw...

Nemetschek Group Speeds Up Digital Transformation for Big 5 Global 2025

Transforming the Built Environment: The Nemetschek Group at Big 5 Global 2025 As digital tools increasingly shape the future of the construction industry, the Nemetschek...