Search results for:
Cobalt Strike
Cyber Security News
China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware
A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community websites to deliver Cobalt Strike malware, according to a recent...
CVE/vulnerability
Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike
Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting systems in Ukraine.
It has been closely...
Cyber Security News
Cobalt Strike 4.9 Released: What’s New!
The latest version of Cobalt Strike 4.9 is now available. This release includes improvements to Cobalt Strike's post-exploitation capabilities, including the ability to export...
Cyber Attack
Chinese Hackers Attacking Semiconductor Industries using Cobalt Strike beacon
A cyber espionage campaign has been discovered in which threat actors use a variant of the HyperBro loader along with a Taiwan Semiconductor Manufacturing...
Cyber Attack
Hackers Modified Cobalt Strike Capabilities to Attack macOS Users
Geacon, a Cobalt Strike implementation written in Golang, is likely to attract the attention of threat actors looking for vulnerable macOS devices.
Threat actors have...
Cyber Security News
Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware
The cybersecurity analysts at Check Point Research recently reported that TrickGate, a shellcode-based packer, has been in operation for over six years without being...
Cyber Attack
Hackers Using Sliver Framework as an Alternative to Cobalt Strike & Metasploit
Silver is an open-source command-and-control framework that is becoming increasingly popular among malicious actors at current attacks. As threat actors are opting for this...
Computer Security
Google Released Over 165 YARA Rules to Detect Cobalt Strike Components in Their Networks
There is a collection of IOCs from VirusTotal and YARA Rules that has been recently open-sourced by the Google Cloud Threat Intelligence team.Â
As a...