Tuesday, April 22, 2025
Homecyber securityHackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

Published on

SIEM as a Service

Follow Us on Google News

A recent cybersecurity incident has highlighted the sophisticated methods used by hackers to target web applications, particularly in South Korea.

The attackers leveraged a combination of tools, including Cobalt Strike, SQLMap, dirsearch, and Web-SurvivalScan, to exploit vulnerabilities and gain unauthorized access to government and commercial entities.

Exploitation Techniques and Tools

The threat actors utilized an open directory hosted on a server in Japan, which was briefly exposed, to manage their operations.

- Advertisement - Google News
Web Applications
C2 server configuration file.

This directory contained a modified version of Cobalt Strike, known as Cobalt Strike Cat, which was delivered via a Rust-compiled Windows executable.

Additionally, the attackers employed SQLMap for SQL injection attacks, dirsearch to brute-force directories, and Web-SurvivalScan for subdomain enumeration.

These tools allowed them to identify vulnerable web applications and exploit SQL vulnerabilities, often resulting in the exfiltration of sensitive data.

The attackers compiled a list of over 1,000 Korean domains, including those belonging to government agencies and private businesses, which were likely used as input for Web-SurvivalScan.

According to the Report, this enabled them to enumerate live subdomains for further analysis and potential exploitation.

A Python script, urls.py, was used to automate the organization of reconnaissance data, streamlining the process of subdomain discovery and supporting follow-on exploitation efforts.

Web Applications
Contents of the Python file, urls.py

Malware Analysis and Network Observables

The malware analysis revealed that the attackers used Cobalt Strike Cat, a modified version of the popular post-exploitation tool, alongside Marte shellcode delivered via Rust-compiled loaders.

These loaders acted as an intermediate execution layer, decoding and running shellcode instead of dropping a standalone payload to disk.

The network behavior of the malware included unusual redirects, which could be tactics to disrupt analysis or mask communications with command-and-control servers.

The logs from the server indicated active intrusions, with beacon activity from compromised hosts.

The attackers used Scripted Web Delivery to stage payloads and maintain access to victim systems.

The use of SQL injection for initial access highlights the importance of enforcing input validation and applying security patches for web applications to prevent similar attacks in the future.

Organizations should monitor for unusual network traffic and log database queries to detect signs of exploitation attempts.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...