Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: C2

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the WildMalware conceptual image, covering topics such as Cobalt Strike Team Server, which can be abused by malware authors for malicious purposes
67,581
people reacted

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild

  • By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj
  • November 3, 2022 at 6:00 AM

23

9 min. read

Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and DecryptionA conceptual image representing malware and its evasions.
48,187
people reacted

Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption

  • By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj
  • July 13, 2022 at 6:00 AM

31

9 min. read

Trending

  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Threat Brief: 3CXDesktopApp Supply Chain Attack by Robert Falcone
  • Threat Brief - CVE-2023-23397 - Microsoft Outlook Privilege Escalation by Unit 42
Popping Eagle: How We Leveraged Global Analytics to Discover a Sophisticated Threat ActorA conceptual image representing malware, such as Popping Eagle.
43,853
people reacted

Popping Eagle: How We Leveraged Global Analytics to Discover a Sophisticated Threat Actor

  • By Yuval Zan and Chen Evgi
  • June 2, 2022 at 3:00 PM

23

12 min. read

Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and DecodingA conceptual image that represents malware, including the malicious uses of Cobalt Strike and its metadata encoding algorithm covered here.
37,658
people reacted

Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding

  • By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj
  • May 6, 2022 at 12:00 PM

11

9 min. read

New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack PatternsA conceptual image representing malware, such as the SolarMarker campaign discussed here.
45,500
people reacted

New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns

  • By Shimi Cohen, Inbal Shalev and Irena Damsky
  • April 8, 2022 at 6:00 PM

294

8 min. read

Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to DetectA conceptual image representing malware, including the adversarial use of Cobalt Strike and its Malleable C2 profile discussed here.
66,297
people reacted

Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect

  • By Chris Navarrete, Durgesh Sangvikar, Andrew Guan, Yu Fu, Yanhui Jia and Siddhart Shibiraj
  • March 16, 2022 at 3:00 PM

17

9 min. read

Detecting and Preventing Malicious Domains Proactively with DNS SecurityA conceptual image representing malicious domains, such as those that can be identified by the proactive detector discussed in this piece.
40,038
people reacted

Detecting and Preventing Malicious Domains Proactively with DNS Security

  • By Zhanhao Chen and Daiping Liu
  • May 4, 2021 at 6:00 AM

23

11 min. read

Emotet Command and Control Case StudyA conceptual image representing the concept of malware, such as that covered in this case study of Emotet Command and Control traffic.
39,667
people reacted

Emotet Command and Control Case Study

  • By Chris Navarrete and Yanhui Jia
  • April 9, 2021 at 12:00 PM

13

9 min. read

Attack Chain Overview: Emotet in December 2020 and January 2021A conceptual image representing malware, such as Emotet, discussed in this blog.
28,113
people reacted

Attack Chain Overview: Emotet in December 2020 and January 2021

  • By Chris Navarrete, Yanhui Jia, Matthew Tennis, Durgesh Sangvikar and Rongbo Shao
  • March 8, 2021 at 6:00 AM

18

11 min. read

njRAT Spreading Through Active Pastebin Command and Control TunnelThis conceptual image illustrates the idea of malware, such as the njRAT spreading through active Pastebin command and control tunnel that is discussed in this blog.
38,760
people reacted

njRAT Spreading Through Active Pastebin Command and Control Tunnel

  • By Yanhui Jia, Chris Navarrete and Haozhe Zhang
  • December 9, 2020 at 6:00 AM

19

6 min. read

xHunt Campaign: Newly Discovered Backdoors Using Deleted Email Drafts and DNS Tunneling for Command and ControlA conceptual image illustrating the concept of espionage, including the type of stealthy activity using backdoors that threat researchers observed the xHunt campaign using.
46,750
people reacted

xHunt Campaign: Newly Discovered Backdoors Using Deleted Email Drafts and DNS Tunneling for Command and Control

  • By Robert Falcone
  • November 9, 2020 at 12:00 AM

35

12 min. read

Prince of Persia – Game Over

  • By Tomer Bar, Lior Efraim and Simon Conant
  • June 28, 2016 at 3:00 PM

9

7 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.