Saturday, January 18, 2025
HomeComputer SecurityGoogle Released Over 165 YARA Rules to Detect Cobalt Strike Components in...

Google Released Over 165 YARA Rules to Detect Cobalt Strike Components in Their Networks

Published on

SIEM as a Service

Follow Us on Google News

There is a collection of IOCs from VirusTotal and YARA Rules that has been recently open-sourced by the Google Cloud Threat Intelligence team

As a result, Google has taken this step to make it easier for security researchers to catch Cobalt Strike components within their network.

While apart from this, using these detection signatures cybersecurity analysts will also be able to detect the deployed versions of Cobalt Strike in their environment.

165 YARA Rules to Detect Cobalt Strike

In order to test the resilience of red teams’ cyber defenses, Cobalt Strike is a popular tool that is used by red teams. Over the last decade, it has been subjected to many development changes and improvements in order to reach its current state.

By doing this, malicious activity can be detected more effectively by targeting potential leaked and cracked versions of the software. In this way, it is easier to distinguish between deployments controlled by threat actors versus those controlled by legitimate deployments.

By leveraging the Cobalt Strike set of components, Google has built a detection system that is capable of detecting these malicious variants in the wild at an extremely high degree of accuracy with YARA-based detection. 

There are approximately ten to one hundred attack template binaries included in each Cobalt Strike version. An important aspect of Cobalt Strike is that it incorporates multiple software tools into one jar file that functions as a single tool.

Cobalt Strike infrastructure setup

As a client, a JAR file is activated that connects the actors to the Team Server so that they can connect to it. Clients are used by actors to manage their teammates and infected hosts through a graphical user interface (GUI).

Moreover, a collection of detection signatures is also shared by Google for an open-source threat emulation framework, Sliver. While threat actors have also adopted this framework as an alternative to Cobalt Strike to conduct security testing.

It is therefore becoming increasingly common for Cobalt Strike to be used in cyberattacks that might lead to the theft of data and ransomware infections, as it is one of the most widely used tools. 

This method of attack is used by threat actors after they have deployed so-called beacons, which enable them to access compromised devices remotely and perform post-exploitation tasks after the attacks have been conducted. 

In order to harvest sensitive data from compromised servers or to deploy further malware, attackers access compromised networks through beacons that have been deployed on the networks of their victims.

VirusTotal customers have access to a collection of community signatures containing these YARA rules that have been formalized as the final YARA rules. In order to make the tool more difficult to abuse by threat actors, Google is moving it back to the domain of legitimate red teams.

Managed DDoS Attack Protection for Applications – Download Free Guide

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....