Cybercriminals Leverage Cobalt Strike, SQLMap, and More to Attack Web Applications

A recent cybersecurity investigation has uncovered a sophisticated campaign targeting South Korean organizations, utilizing a combination of powerful tools including Cobalt Strike, SQLMap, and other open-source utilities.

The attackers exploited vulnerabilities in web applications to gain unauthorized access, highlighting the evolving tactics of cybercriminals in leveraging both commercial and open-source tools for malicious purposes.

Attack Infrastructure and Tools

The campaign was discovered through an open directory hosted on a server in Japan, which was briefly exposed and contained a range of tools used for reconnaissance and exploitation.

Among these tools were dirsearch, a command-line utility for brute-forcing directories and files on web servers, and sqlmap, an automated SQL injection tool used to exploit SQL vulnerabilities and extract sensitive data.

Additionally, Web-SurvivalScan was employed for subdomain enumeration, allowing attackers to identify active domains within target environments.

Web Applications
res.txt containing the results of Web-SurvivalScan.

This tool, though not commonly reported in malicious activities, supports proxy integration to evade detection.

The attackers compiled a list of over 1,000 Korean domains, including those associated with government agencies and private businesses, which were likely used as input for Web-SurvivalScan to enumerate live subdomains for further analysis.

A Python script, urls.py, was also found, which processed the output of Web-SurvivalScan queries, automating the organization of reconnaissance data.

According to the Hunt researchers, this streamlined subdomain discovery and supported follow-on exploitation efforts.

Malware Analysis and Delivery

The campaign involved the use of Cobalt Strike Cat, a modified version of the popular penetration testing tool Cobalt Strike.

This variant was first circulated on a Chinese-language hacking forum and was delivered via a Rust-compiled loader.

Web Applications
contents of the ‘sqli’ folder.

The attackers used a combination of MinGW- and Rust-compiled executables to evade detection and deliver payloads.

Notably, some of these executables acted as intermediate layers, decoding and executing shellcode instead of dropping standalone payloads to disk.

The Marte shellcode was identified in some of these binaries, highlighting the sophistication of the attack.

The attackers also employed unusual network behavior, including HTTP redirects to the CIA website, which may have been used to disrupt analysis in sandboxes or mask actual command-and-control communications.

Logs from the server revealed beacon activity from compromised hosts, indicating ongoing intrusions at the time of discovery.

This campaign underscores the importance of robust cybersecurity measures, particularly for organizations in South Korea and beyond.

To mitigate such threats, organizations should enforce strict input validation, apply security patches for web applications, and monitor for signs of SQL injection attempts.

Additionally, monitoring network traffic for unusual patterns and maintaining up-to-date threat intelligence are crucial steps in defending against these sophisticated attacks.

The use of open-source tools by attackers highlights the need for continuous vigilance and proactive security strategies to protect against evolving cyber threats.

Also Read:

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here