HomeCyber BalkansCobalt Strike 4.11 now includes Built-In Evasion Features for Red Teams

Cobalt Strike 4.11 now includes Built-In Evasion Features for Red Teams

Published on

spot_img

The release of Cobalt Strike version 4.11 marks a significant milestone in the realm of offensive security operations. This latest update is packed with a robust suite of features that cater to enhancing evasion capabilities for red teams, solidifying Cobalt Strike’s position as a leading platform for threat emulation.

One of the key highlights of Cobalt Strike 4.11 is the enhanced evasion options it offers. The introduction of the novel Sleepmask feature, automatically enabled via Malleable C2, adds a layer of obfuscation to Beacon, its heap allocations, and itself. This new Sleepmask makes the tool more robust against static signatures without requiring additional configuration, seamlessly integrating with Beacon to enhance runtime masking.

Another notable addition is the novel process injection technique, “ObfSetThreadContext,” which sets the injected thread start address as the legitimate remote image entry point. This technique bypasses typical thread injection detection methods by ensuring that injected threads appear as if they originate from legitimate executable images. Users can configure this technique by specifying a module and function offset for the thread start address in the configuration file.

In addition to enhanced evasion capabilities, Cobalt Strike has overhauled Beacon’s reflective loader, shifting to a prepend/sRDI style loader. This overhaul includes features like EAF Bypass, support for indirect syscalls, and obfuscation routines that allow the application of complex obfuscation routines to Beacon payloads.

A significant addition to the latest release is the introduction of Asynchronous Beacon Object Files (BOFs) through async-execute.dll. This feature allows the execution of BOFs in new threads without blocking Beacon, supporting both single-shot and background execution modes. Operators can now run multiple BOFs simultaneously within the same process, each executing as its own job with output viewable in the Cobalt Strike GUI.

Furthermore, the release includes a DNS over HTTPS Beacon, providing users with a stealthy network egress option. This feature allows users to easily configure DoH settings via Malleable C2, enhancing the flexibility and stealthiness of network communications.

Cobalt Strike 4.11 also includes quality-of-life updates such as enhanced command line variables, a reorganized Beacon help command, improved host rotation capabilities, and data exfiltration prevention features. These updates not only improve the overall user experience but also provide a more robust framework for customizing tradecraft within the Cobalt Strike ecosystem.

Overall, Cobalt Strike 4.11 represents a significant leap forward in the world of threat emulation, empowering red teams with advanced evasion capabilities and enhanced operational flexibility. The integrated features not only enhance stealth operations but also provide a solid foundation for customization within the Cobalt Strike ecosystem, showcasing the commitment of developers to continuously innovate and support sophisticated offensive security operations.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...