Thursday, December 12, 2024
Search results for:

Cobalt Strike

Chinese Hackers Attacking Semiconductor Industries using Cobalt Strike beacon

A cyber espionage campaign has been discovered in which threat actors use a variant of the HyperBro loader along with a Taiwan Semiconductor Manufacturing...

Hackers Modified Cobalt Strike Capabilities to Attack macOS Users

Geacon, a Cobalt Strike implementation written in Golang, is likely to attract the attention of threat actors looking for vulnerable macOS devices. Threat actors have...

Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

The cybersecurity analysts at Check Point Research recently reported that TrickGate, a shellcode-based packer, has been in operation for over six years without being...

Hackers Using Sliver Framework as an Alternative to Cobalt Strike & Metasploit

Silver is an open-source command-and-control framework that is becoming increasingly popular among malicious actors at current attacks. As threat actors are opting for this...

Google Released Over 165 YARA Rules to Detect Cobalt Strike Components in Their Networks

There is a collection of IOCs from VirusTotal and YARA Rules that has been recently open-sourced by the Google Cloud Threat Intelligence team.  As a...

Chinese APT Hackers Using a Custom Versions of Cobalt Strike to Deploy Backdoor Malware

Security analysts at Trend Micro have recently tracked down 'Earth Longzhi', a previously unknown Chinese APT hacking group that is actively targeting several organizations...

Critical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike Toolkit

Recently, a brand-new out-of-band security update (Cobalt Strike 4.7.2) has been released by HelpSystems to fix an RCE vulnerability in the post-exploitation Cobalt Strike...

Threat Actors Using Squirrelwaffle Loader to Deploy Qakbot & Cobalt Strike Malware

A new threat emerged recently in the wild that drops malware like Qakbot and Cobalt Strike onto negotiated systems and networks; this new threat...