Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media

This campaign demonstrates the evolving threat landscape where attackers exploit the trust inherent in popular platforms to establish resilient command-and-control infrastructure, highlighting the need for enhanced detection capabilities that can identify malicious activities across legitimate web services. The malware specifically targets the legitimate BugSplat crash reporting utility, exploiting it through a technique known as DLL substitution to load malicious code while maintaining the appearance of normal system operations. A sophisticated cyberattack campaign targeting the Russian IT industry has emerged, demonstrating how threat actors are increasingly leveraging legitimate online platforms to distribute the notorious Cobalt Strike Beacon malware. The campaign, which peaked during November and December 2024 and continued through April 2025, represents a significant evolution in attack methodology, utilizing popular social media platforms and code repositories as command-and-control infrastructure. The malware exploits BugSplat’s crash reporting utility by hijacking its required DLL, forcing it to load malicious code instead of legitimate functionality. What sets this campaign apart is its innovative use of social media platforms and popular websites as staging grounds for malicious payloads. This technique allows the malware to blend seamlessly with legitimate web traffic, making detection significantly more challenging for traditional security solutions. Securelist analysts identified that the attackers established fake profiles on GitHub, Microsoft Learn Challenge, Quora, and Russian-language social networks to host encoded payload information. The malware then queries social media profiles containing base64-encoded, XOR-encrypted data that reveals additional payload URLs.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 31 Jul 2025 19:35:17 +0000


Cyber News related to Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media

Malicious use of Cobalt Strike down 80% after crackdown, Fortra says | The Record from Recorded Future News - Microsoft, the Health Information Sharing and Analysis Center (Health-ISAC) and Fortra, which bought Cobalt Strike in 2020, have worked since 2023 to address the longstanding issue of pirated and unlicensed versions of the software being downloaded ...
1 year ago Therecord.media
International Operation Takes Down 593 Malicious Cobalt Strike Servers - Law enforcement agencies from around the world have successfully shut down 593 rogue servers running unauthorized versions of Cobalt Strike, a tool often misused by cybercriminals. Cobalt Strike, developed in 2012 by Raphael Mudge and now owned by ...
1 year ago Cybersecuritynews.com
AI and the Evolution of Social Media - A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. In a 2022 survey, Americans blamed social media for the coarsening of our political discourse, the spread of misinformation, and the increase in ...
1 year ago Securityboulevard.com
Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike - A sophisticated Chinese state-sponsored cyber espionage campaign has emerged targeting Taiwan’s critical semiconductor industry, employing weaponized Cobalt Strike beacons and advanced social engineering tactics. The campaign represents a ...
7 months ago Cybersecuritynews.com
Speaking Freely: Lynn Hamadallah - There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine. The argument put forward was that those cases represented instances of free speech rather than hate speech. You ...
1 year ago Eff.org
CVE-2025-71127 - In the Linux kernel, the following vulnerability has been resolved: ...
56 years ago
Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media - This campaign demonstrates the evolving threat landscape where attackers exploit the trust inherent in popular platforms to establish resilient command-and-control infrastructure, highlighting the need for enhanced detection capabilities that can ...
7 months ago Cybersecuritynews.com
Europol Announces Crackdown on Cobalt Strike Servers Used by Cybercriminals - European law enforcement agency Europol on Wednesday announced a global crackdown against the use of legitimate security tools by cybercriminals, including the takedown of nearly 600 Cobalt Strike servers linked to criminal activity. The agency said ...
1 year ago Securityweek.com
Red Team Tool Cobalt Strike 4.11 Released With out-of-the-box Evasion Options - The update introduces a novel Sleepmask, new process injection techniques, enhanced obfuscation options, and stealthier communication methods – all designed to operate effectively without requiring extensive customization. The release also ...
11 months ago Cybersecuritynews.com
Best of 2023: Why is everyone getting hacked on Facebook? - Importantly, phishing relies on the victim trusting the scammer and taking an action - like clicking a link or sending bank account information - in order for the scammer to get what they want. It's not your imagination - social media scams really ...
2 years ago Securityboulevard.com
Protecting Your Digital Space: A Guide on How to Stay Cyber Safe on Social Media - In the age of digital inter-connectedness, social media has become an integral part of our daily lives, enabling us to connect, share, and communicate globally. As cyber threats continue to evolve, it's crucial to adopt proactive measures to ensure ...
2 years ago Cybersecurity-insiders.com
Hackers Abuse Cobalt Strike, SQLMap & Other Tools to Target Organizations' Web Applications - These attacks specifically utilize Cobalt Strike, a legitimate adversary simulation tool designed for security professionals, and SQLMap, an open-source utility that automates the detection and exploitation of SQL injection vulnerabilities. The ...
11 months ago Cybersecuritynews.com
Social Engineering: The Art of Human Hacking - Social engineering exploits this vulnerability by manipulating human psychology and emotions to gain unauthorized access to systems and data. Rather than directly breaking cyber defenses, social engineering tactics exploit human vulnerabilities - ...
2 years ago Offsec.com
Malware Takedowns Show Progress, But Fight Against Cybercrime Not Over - Takedown of malware infrastructure by law enforcement has proven to have an impact, albeit limited, on cybercriminal activity, according to threat intelligence provider Recorded Future. The Emotet takedown, led by Europol and Eurojust in 2021. The ...
2 years ago Infosecurity-magazine.com
Identifying Misuse of Cobalt Strike Systems - Google Cloud recently identified 34 cracked versions of Cobalt Strike and released YARA Rules to detect them. The goal is to make it harder for malicious actors to abuse the tool. IronNet believes that a proactive approach to Cobalt Strike server ...
3 years ago Ironnet.com
Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon - The ongoing attacks demonstrate advanced persistent threat techniques, deploying multiple malware families including MDifyLoader, Cobalt Strike Beacon, vshell, and Fscan to establish long-term access to compromised networks. Following initial ...
7 months ago Cybersecuritynews.com CVE-2025-0282
Social Justice: a global perspective - Today, we commemorate World Day of Social Justice and honor those across the globe who stand for the equitable access to opportunities within societies where individuals' rights are recognized and protected. I have the distinct honor of leading the ...
2 years ago Feedpress.me
Social Engineering Attacks: Tactics and Prevention - Social engineering attacks have become a significant concern in today's digital landscape, posing serious risks to the security and sensitive information of individuals and organizations. By comprehending these tactics and implementing preventive ...
2 years ago Securityzap.com
Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red - Social engineering is effectively hacking human thought processes. Social engineering is a major factor in the overall process but is not directly part of repurposing electronic systems. A social engineer is usually classified as a hacker, and is ...
1 year ago Securityweek.com
2023 Year in Review: The U.S. Supreme Court's Busy Year of Free Speech and Tech Cases - The U.S. Supreme Court has taken an unusually active interest in internet free speech issues. EFF participated as amicus in a whopping nine cases before the court this year. The court decided four of those cases, and decisions in the remaining five ...
2 years ago Eff.org
SQL Brute Force leads to Bluesky Ransomware - In December 2022, we observed an intrusion on a public-facing MSSQL Server, which resulted in BlueSky ransomware. First discovered in June 2022, BlueSky ransomware has code links to Conti and Babuk ransomware. While other reports point to malware ...
2 years ago Thedfirreport.com CVE-2023-27350 BianLian
Exploring How Virtual Worlds Change Social Media Experiences - Humans have always desired to connect with one another, from the days of sending letters to the current age of social media. As technology has advanced, so have the ways we communicate. We are now seeing a shift in the way tech giants are embracing ...
3 years ago Hackread.com
CVE-2025-38227 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
Kids Online Safety Shouldn't Require Massive Online Censorship and Surveillance: 2023 Year in Review - Many of these bills would run roughshod over the rights of young people and adults in the process. There's also good news: so far, none of these dangerous bills have been passed at the federal level, or signed into law. That's thanks to a large ...
2 years ago Eff.org
Lawmakers: Ban TikTok to Stop Election Misinformation! Same Lawmakers: Restrict How Government Addresses Election Misinformation! - In a case being heard Monday at the Supreme Court, 45 Washington lawmakers have argued that government communications with social media sites about possible election interference misinformation are illegal. Just this week the vast majority of those ...
1 year ago Eff.org