![]() ![]() "Its built-in capabilities enable it to be quickly deployed and operationalized regardless of actor sophistication or access to human or financial resources," said cybersecurity company Proofpoint in a 2021 report. The company did not immediately respond to Information Security Media Group's request for comment, but its popularity among hackers is no secret. The red-teaming application - licenses for which currently run nearly $6,000 per user - wasn't designed for hackers, and malicious activity isn't its purpose (see: Attackers Increasingly Using Cobalt Strike). The Conti ransomware group values access to Cobalt Strike so much that it paid a legitimate company $30,000 to secretly buy licenses for it, cybersecurity reporter Brian Krebs wrote in March. The number of organizations affected by a hack involving Cobalt Strike now number in the tens of thousands each year, says the Department of Health and Human Services in a new warning to the healthcare sector. #Run bible analyzer from website download#The first thing the threat actor behind the Emotet malware does after an initial infection is to download Cobalt Strike onto compromised endpoints. Hackers who earlier this year got into Cisco corporate IT infrastructure used the tool. Russian hackers deployed Cobalt Strike's command-and-control function during their attack against SolarWinds' network management software. See Also: OnDemand | API Protection – The Strategy of Protecting Your APIs ![]() If every second hack seems to involve malicious use of penetration testing tool Cobalt Strike, it's not just your imagination. ![]() The Department of Health and Human Services' Office of Information Security's HC3 unit says attackers are weaponizing legitimate security tools. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |