Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

TechCrunch Mobility: An acquisition that may not be hostile

Whitehouse is already one of the most blocked accounts on Bluesky

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers expanding the reach of cobalt strike beacons to Linux and macos using Crossc2
Identity

Hackers expanding the reach of cobalt strike beacons to Linux and macos using Crossc2

userBy userAugust 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 14, 2025Ravi LakshmananThreat Intelligence / Linux

Crossc2 expands cobalt strike

On Sunday, the Japan Certificate Regulation Center (JPCERT/CC) revealed on Thursday that an incident was observed involving the use of a command-and-control (C2) framework called CrossC2.

The agency said the activity was detected between September and December 2024 and targeted multiple countries, including Japan, based on an analysis of virustotal artifacts.

“In their attempts to penetrate AD, the attackers adopted Crossc2 and other tools such as Psexec, Plink and Cobalt Strike. Further investigation revealed that the attackers used custom malware as the loader of Cobalt Strike.

The custom-made cobalt strike beacon loader is called the readnimeloader. CrossC2, an unofficial beacon and builder, can run various cobalt strike commands after establishing communication with the remote server specified in the configuration.

In an attack documented by JPCERT/CC, scheduled tasks set by threat actors on the compromised machine are used to launch legitimate java.exe binaries, which are then abused and removed readnimeloader (“jli.dll”).

Cybersecurity

A loader written in the NIM programming language extracts the content of a text file and runs it directly in memory to avoid leaving traces on disk. This loaded content is an open source shellcode loader called Odinldr that will decrypt and run it in memory.

Readnimeloader also incorporates a variety of preventative and anti-analytical techniques designed to prevent Odinldr from being decoded unless the route is clear.

JPCERT/CC said the attack campaign shared some degree of overlap with the BlackSuit/Black Basta ransomware activity reported by Rapid7 in June 2025, citing files with similar names as the duplicates of the command and control (C2) domains used.

Another notable aspect is the presence of several ELF versions of SystemBC. This is a backdoor that acts as a precursor to the deployment of cobalt strikes and ransomware.

“There are many incidents, including cobalt strikes, but this article focused on specific cases where CrossC2, a tool that extends the cobalt strike beacon functionality to multiple platforms, was used in the attack, and compromised Linux servers within the internal network,” says Masubuchi.

“Many Linux servers do not have EDR or similar systems installed, and therefore have a potential entry point for further compromise, so you need to be more careful.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAirbnb allows users to book their stays without advance payment
Next Article 115 million-year-old dinosaur truck excavated in Texas after destroying the flood
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

TechCrunch Mobility: An acquisition that may not be hostile

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.