TencShell Malware Framework Uses Tencent Style Traffic to Evade Detection

The TencShell framework repurposes open source Rshell code and uses Tencent style API traffic to hide its command and control communications from security tools.

CSBadmin
2 Min Read

Discovery and Initial Infection

Researchers have uncovered a new malware framework called TencShell that gives attackers full remote control over compromised systems. The implant was detected in an attack against a global manufacturing company with operations in multiple countries, with the intrusion traced back to a third party user who had legitimate access to the company’s internal network. Analysts at Cato Networks identified the attempted breach in April 2026 and blocked it before the attacker could establish persistent remote control.

The initial infection vector remains unknown but likely involved phishing, a malicious download, or another web-based delivery method. The attackers exploited the trusted access of the third party as a bridge, turning a routine business relationship into a dangerous entry point.

Capabilities and Evasion Techniques

TencShell is derived from Rshell, an open source offensive security framework. The threat actor customized and repackaged it, adding communication patterns that closely mimic Tencent style API traffic to make malicious requests look like ordinary application activity. The name combines “Tenc” for those Tencent like command and control paths and “Shell” for its core remote access behavior.

The framework functions as a full operator platform, supporting screen capture, live screen streaming, browser artifact access, and UAC bypass. The broader concern is that attackers no longer need custom malware development pipelines to pull off sophisticated intrusions. Adapting freely available offensive frameworks is often enough to build a capable, hard to detect tool, lowering the barrier for a much wider range of threat actors.

Source: Cyber Security News

CSBadmin

The latest in cybersecurity news and updates.

Share This Article
Follow:
The latest in cybersecurity news and updates.