On Monday, cybersecurity researchers unveiled the existence of a newly identified re-implementation of the notorious Cobalt Strike Beacon for both Linux and Windows operating systems. This variant, dubbed “Vermilion Strike,” has been actively targeting a range of sectors, including government, telecommunications, IT, and financial institutions.
This advanced yet undetected penetration testing tool represents a rare Linux adaptation, as Cobalt Strike has traditionally been associated with Windows-based environments. It has gained notoriety among cyber adversaries for being repurposed to conduct a variety of targeted attacks. Marketed as “threat emulation software,” Cobalt Strike’s Beacon payload is designed to simulate the operations of advanced threat actors, capturing their post-exploitation behavior.
According to a report from Intezer, the stealthy variant communicates with its command-and-control (C2) server using established Cobalt Strike protocols. It boasts remote access capabilities allowing attackers to upload files, execute shell commands, and modify existing files. The research findings were based on an artifact that surfaced on VirusTotal from Malaysia on August 10, with only two malware detection engines currently flagging the file as malicious.
Once installed on a system, the malware operates quietly in the background, decrypting the necessary configurations for the beacon to function. It then fingerprints the compromised Linux machine and establishes communication with a remote server using DNS or HTTP protocols. This communication allows it to retrieve encoded and encrypted instructions, enabling it to execute arbitrary commands, write to files, and upload data back to the command center.
Furthermore, additional samples identified during the investigation have shed light on the Windows variant of this malware, revealing significant overlap in functionality and C2 domains utilized for remote operations. Intezer highlighted the limited scope of this espionage campaign, attributing it to a proficient threat actor, as Vermilion Strike has not yet been linked to broader attack patterns.
This is not the first instance of Cobalt Strike being exploited for malicious purposes. Recent reports from Secureworks depicted a targeted spear-phishing campaign by the threat group Tin Woodlawn (also known as APT32), which used a modified version of Cobalt Strike to bypass security measures for the purpose of intellectual property theft.
The revelation regarding Vermilion Strike highlights an ongoing threat in the cybersecurity landscape. As Linux servers gain traction in cloud environments, the potential for advanced persistent threats to adapt and refine their toolsets remains high, thereby posing a significant risk to critical sectors.
Found this article interesting? Follow us on Google News, Twitter, and LinkedIn for more exclusive content.