What CFOs really think about cyber risk
CFOs say they’re confident in their organisation’s ability to handle cyber risk – and more than half plan to outsource cybersecurity expertise.
Read More
Attackers are getting in through the UI. Over the last few weeks, three campaigns (Tsundere, Matrix Push C2 and Sturnus) have shown how threat actors are turning ordinary interface features into command channels, surveillance layers and initial access vectors. It’s a development that’s pushing cybersecurity practitioners to rethink how they approach ‘trusted’ user experiences.
If you needed a reminder that initial access is now UX engineering, the Tsundere botnet is a good place to start.
Researchers at Kaspersky (as reported by The Hacker News) found that Tsundere was delivered in at least one observed case via an MSI installer downloaded through a compromised RMM tool, and that artefact names such as Valorant, r6x (Rainbow Six Siege X), and cs2 (Counter-Strike 2) suggest the operator may be using game-related lures – potentially aimed at users searching for pirated or portable builds.
Once executed, the installer quietly drops Node.js, runs npm install, and pulls in three modules:
That last detail is the twist. Instead of hard-coded IPs, Tsundere queries a smart contract created in September 2024 which stores the live C2 endpoint (e.g., ws://193.24.123[.]68:3011). This is decentralised infrastructure as resilience: no DNS, no central server, and no quick way to take down the lookup mechanism.
The operator panel behind Tsundere is equally telling. According to Kaspersky’s researchers, it can generate new MSI or PowerShell payloads, convert bots into proxies for routing malicious traffic, and even browse other botnets for purchase – showing that malware operators increasingly behave like DevOps teams with product dashboards.
And importantly, Tsundere makes the installer itself a core part of the tradecraft. It exploits user trust in familiar app names and the convenience of ‘just install and play’. The attack starts at the interface.
If Tsundere abuses the installer, Matrix Push C2 abuses the browser.
Instead of starting with a traditional malware dropper, this service turns web push notifications into a long-lived fileless C2 and phishing mechanism – as detailed in a new report from Blackfog.
Victims only need to do one thing: click ‘Allow notifications’. From that moment, attackers can send OS-native alerts that look legitimate – ‘Suspicious login detected’, ‘Browser update required’, ‘Password expired’. The notification carries a phishing link; the browser becomes the delivery pipeline.
Matrix Push is sold as malware-as-a-service, with subscription tiers starting at USD $150 per month. Operators get a sleek dashboard to:
Because everything happens inside the browser, the campaign is cross-platform by default and bypasses many endpoint controls. No download, no binary, no signature.
And the defensive challenge is almost philosophical: the attack depends on a user-interface decision – one that’s usually treated as benign UX, not a security gateway.
Tsundere and Matrix Push show how attackers hide in everyday desktop interfaces. And Sturnus shows how that logic extends to mobile.
It’s a new Android banking trojan in early testing, likely targeting financial institutions across Southern and Central Europe. In a report by ThreatFabric, researchers explain how it masquerades as apps including Google Chrome and Preemix Box, then requests broad accessibility service permissions – the point at which the user interface becomes the real attack surface.
Once granted, Sturnus can:
Its core capability is overlay-based credential theft. It draws fake banking login screens over real apps, then disables the overlay once credentials are captured – a subtle touch designed to minimise suspicion.
The privacy angle is brutal. Because Sturnus captures data at the screen layer, it can read WhatsApp, Telegram and Signal messages after they’re decrypted for display. It also blocks removal by detecting when users try to revoke admin rights and redirecting them away from system settings.
In short, Sturnus turns the Android UI itself into both the surveillance tool and the persistence mechanism.
The thread running through all these cases is that attackers are moving into the seams between UX design and security architecture. So cybersecurity practitioners will need to treat those seams as part of the perimeter.
Join the newsletter to receive the latest updates in your inbox.
CFOs say they’re confident in their organisation’s ability to handle cyber risk – and more than half plan to outsource cybersecurity expertise.
Read More
From fake celebrity endorsements to cloned voices in mobile scams, 2025 proved that deepfakes are now a real business and consumer risk.
Read More
As AI tools move from pilots to the fabric of everyday work, the same systems that boost productivity are leaking sensitive data and stretching identity controls past their limits.
Read More