Wednesday, March 19, 2025
Homecyber securityHackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

Published on

SIEM as a Service

Follow Us on Google News

A recent cybersecurity incident has highlighted the sophisticated methods used by hackers to target web applications, particularly in South Korea.

The attackers leveraged a combination of tools, including Cobalt Strike, SQLMap, dirsearch, and Web-SurvivalScan, to exploit vulnerabilities and gain unauthorized access to government and commercial entities.

Exploitation Techniques and Tools

The threat actors utilized an open directory hosted on a server in Japan, which was briefly exposed, to manage their operations.

Web Applications
C2 server configuration file.

This directory contained a modified version of Cobalt Strike, known as Cobalt Strike Cat, which was delivered via a Rust-compiled Windows executable.

Additionally, the attackers employed SQLMap for SQL injection attacks, dirsearch to brute-force directories, and Web-SurvivalScan for subdomain enumeration.

These tools allowed them to identify vulnerable web applications and exploit SQL vulnerabilities, often resulting in the exfiltration of sensitive data.

The attackers compiled a list of over 1,000 Korean domains, including those belonging to government agencies and private businesses, which were likely used as input for Web-SurvivalScan.

According to the Report, this enabled them to enumerate live subdomains for further analysis and potential exploitation.

A Python script, urls.py, was used to automate the organization of reconnaissance data, streamlining the process of subdomain discovery and supporting follow-on exploitation efforts.

Web Applications
Contents of the Python file, urls.py

Malware Analysis and Network Observables

The malware analysis revealed that the attackers used Cobalt Strike Cat, a modified version of the popular post-exploitation tool, alongside Marte shellcode delivered via Rust-compiled loaders.

These loaders acted as an intermediate execution layer, decoding and running shellcode instead of dropping a standalone payload to disk.

The network behavior of the malware included unusual redirects, which could be tactics to disrupt analysis or mask communications with command-and-control servers.

The logs from the server indicated active intrusions, with beacon activity from compromised hosts.

The attackers used Scripted Web Delivery to stage payloads and maintain access to victim systems.

The use of SQL injection for initial access highlights the importance of enforcing input validation and applying security patches for web applications to prevent similar attacks in the future.

Organizations should monitor for unusual network traffic and log database queries to detect signs of exploitation attempts.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

Supervisory Control and Data Acquisition (SCADA) systems play a pivotal role in managing critical...

SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats

The average corporate user now has 146 stolen records linked to their identity, an...

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it...

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

Supervisory Control and Data Acquisition (SCADA) systems play a pivotal role in managing critical...

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it...

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to...