Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Ice dance duo skated to AI music at the Olympics

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers expanding the reach of cobalt strike beacons to Linux and macos using Crossc2
Identity

Hackers expanding the reach of cobalt strike beacons to Linux and macos using Crossc2

userBy userAugust 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 14, 2025Ravi LakshmananThreat Intelligence / Linux

Crossc2 expands cobalt strike

On Sunday, the Japan Certificate Regulation Center (JPCERT/CC) revealed on Thursday that an incident was observed involving the use of a command-and-control (C2) framework called CrossC2.

The agency said the activity was detected between September and December 2024 and targeted multiple countries, including Japan, based on an analysis of virustotal artifacts.

“In their attempts to penetrate AD, the attackers adopted Crossc2 and other tools such as Psexec, Plink and Cobalt Strike. Further investigation revealed that the attackers used custom malware as the loader of Cobalt Strike.

The custom-made cobalt strike beacon loader is called the readnimeloader. CrossC2, an unofficial beacon and builder, can run various cobalt strike commands after establishing communication with the remote server specified in the configuration.

In an attack documented by JPCERT/CC, scheduled tasks set by threat actors on the compromised machine are used to launch legitimate java.exe binaries, which are then abused and removed readnimeloader (“jli.dll”).

Cybersecurity

A loader written in the NIM programming language extracts the content of a text file and runs it directly in memory to avoid leaving traces on disk. This loaded content is an open source shellcode loader called Odinldr that will decrypt and run it in memory.

Readnimeloader also incorporates a variety of preventative and anti-analytical techniques designed to prevent Odinldr from being decoded unless the route is clear.

JPCERT/CC said the attack campaign shared some degree of overlap with the BlackSuit/Black Basta ransomware activity reported by Rapid7 in June 2025, citing files with similar names as the duplicates of the command and control (C2) domains used.

Another notable aspect is the presence of several ELF versions of SystemBC. This is a backdoor that acts as a precursor to the deployment of cobalt strikes and ransomware.

“There are many incidents, including cobalt strikes, but this article focused on specific cases where CrossC2, a tool that extends the cobalt strike beacon functionality to multiple platforms, was used in the attack, and compromised Linux servers within the internal network,” says Masubuchi.

“Many Linux servers do not have EDR or similar systems installed, and therefore have a potential entry point for further compromise, so you need to be more careful.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAirbnb allows users to book their stays without advance payment
Next Article 115 million-year-old dinosaur truck excavated in Texas after destroying the flood
user
  • Website

Related Posts

North Korean agents impersonate experts on LinkedIn to infiltrate companies

February 10, 2026

Reynolds ransomware embeds BYOVD drivers that disable EDR security tools

February 10, 2026

Inside the rise of the digital parasite

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Ice dance duo skated to AI music at the Olympics

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.