Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Tracking Cobalt Strike Servers Used in Cyberattacks on Ukraine
Malware and Vulnerabilities
May 09, 2022
Security Boulevard
One of the ways Cobalt Strike operators obfuscate communications between a beacon planted on a victim system and the C2 server is through the use of a malleable profile, that allows masquerading the beacon communication as benign network traffic.
Read More
Ukraine
Russia
Cobalt Strike
nginx
CERT-UA
Publisher
Previous
BPFDoor — an active Chinese global surveillance tool
Malware and Vulnerabilities
Next
Attackers Inject Fileless Malware Directly into Windows ...
Malware and Vulnerabilities