Security News > 2022 > August > Chinese hackers use new Cobalt Strike-like attack framework
Researchers have observed a new post-exploitation attack framework used in the wild, named Manjusaka, which can be deployed as an alternative to the widely abused Cobalt Strike toolset or parallel to it for redundancy.
Its RAT implants support command execution, file access, network reconnaissance, and more, so hackers can use it for the same operational goals as Cobalt Strike.
"Cisco Talos recently discovered a new attack framework called"Manjusaka" being used in the wild that has the potential to become prevalent across the threat landscape.
This framework is advertised as an imitation of the Cobalt Strike framework," warns the Cisco Talos researchers.
"This new attack framework contains all the features that one would expect from an implant it is written in the most modern and portable programming languages."
Threat actors are expected to continue moving away from Cobalt Strike gradually, and many alternative attack frameworks will likely appear, attempting to grow into the new market opportunity.
News URL
Related news
- Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others (source)
- US sanctions APT31 hackers behind critical infrastructure attacks (source)
- Hackers exploit Ray framework flaw to breach servers, hijack resources (source)
- Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack (source)
- A “cascade” of errors let Chinese hackers into US government inboxes (source)
- Microsoft still unsure how hackers stole MSA key in 2023 Exchange attack (source)
- Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack (source)
- TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks (source)
- Hackers hijack OpenMetadata apps in Kubernetes cryptomining attacks (source)
- Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike (source)