Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Leaked Meta AI Rules indicate that chatbots are allowed to have romantic chats with children

New HTTP/2 ‘Madyoureset’ vulnerability allows large-scale DOS attacks

Apple’s blood oxygen monitoring returns to the latest Apple Watches

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers expanding the reach of cobalt strike beacons to Linux and macos using Crossc2
Identity

Hackers expanding the reach of cobalt strike beacons to Linux and macos using Crossc2

userBy userAugust 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 14, 2025Ravi LakshmananThreat Intelligence / Linux

Crossc2 expands cobalt strike

On Sunday, the Japan Certificate Regulation Center (JPCERT/CC) revealed on Thursday that an incident was observed involving the use of a command-and-control (C2) framework called CrossC2.

The agency said the activity was detected between September and December 2024 and targeted multiple countries, including Japan, based on an analysis of virustotal artifacts.

“In their attempts to penetrate AD, the attackers adopted Crossc2 and other tools such as Psexec, Plink and Cobalt Strike. Further investigation revealed that the attackers used custom malware as the loader of Cobalt Strike.

The custom-made cobalt strike beacon loader is called the readnimeloader. CrossC2, an unofficial beacon and builder, can run various cobalt strike commands after establishing communication with the remote server specified in the configuration.

In an attack documented by JPCERT/CC, scheduled tasks set by threat actors on the compromised machine are used to launch legitimate java.exe binaries, which are then abused and removed readnimeloader (“jli.dll”).

Cybersecurity

A loader written in the NIM programming language extracts the content of a text file and runs it directly in memory to avoid leaving traces on disk. This loaded content is an open source shellcode loader called Odinldr that will decrypt and run it in memory.

Readnimeloader also incorporates a variety of preventative and anti-analytical techniques designed to prevent Odinldr from being decoded unless the route is clear.

JPCERT/CC said the attack campaign shared some degree of overlap with the BlackSuit/Black Basta ransomware activity reported by Rapid7 in June 2025, citing files with similar names as the duplicates of the command and control (C2) domains used.

Another notable aspect is the presence of several ELF versions of SystemBC. This is a backdoor that acts as a precursor to the deployment of cobalt strikes and ransomware.

“There are many incidents, including cobalt strikes, but this article focused on specific cases where CrossC2, a tool that extends the cobalt strike beacon functionality to multiple platforms, was used in the attack, and compromised Linux servers within the internal network,” says Masubuchi.

“Many Linux servers do not have EDR or similar systems installed, and therefore have a potential entry point for further compromise, so you need to be more careful.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCaltech uses sound to unlock long quantum information storage
Next Article Apple’s blood oxygen monitoring returns to the latest Apple Watches
user
  • Website

Related Posts

New HTTP/2 ‘Madyoureset’ vulnerability allows large-scale DOS attacks

August 14, 2025

Have you turned off the virtual oven?

August 14, 2025

New Android Malware Wave Hit Banking, Call Hijacking, Root Exploits via NFC Relay Scam

August 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Leaked Meta AI Rules indicate that chatbots are allowed to have romantic chats with children

New HTTP/2 ‘Madyoureset’ vulnerability allows large-scale DOS attacks

Apple’s blood oxygen monitoring returns to the latest Apple Watches

Hackers expanding the reach of cobalt strike beacons to Linux and macos using Crossc2

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Google’s Genie 3: The Dawn of General AI?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.