Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS

Posted on August 15, 2025August 16, 2025 By CWS

A classy risk marketing campaign has emerged that leverages CrossC2, an unofficial extension software that expands Cobalt Strike’s infamous capabilities past Home windows techniques to focus on Linux and macOS environments.

Between September and December 2024, cybersecurity incidents involving this cross-platform malware have been documented, representing a big evolution in risk actor techniques that historically targeted on Home windows-based infrastructure.

The assault marketing campaign demonstrates outstanding technical sophistication, using a multi-stage an infection chain that begins with authentic system processes and progressively deploys extra malicious elements.

Attackers utilized a mix of established instruments together with PsExec, Plink, and conventional Cobalt Strike alongside the novel CrossC2 extension, making a complete assault framework able to penetrating Lively Listing environments throughout a number of working techniques.

The marketing campaign’s attain extends past Japan, with proof suggesting comparable actions throughout a number of nations primarily based on submissions to VirusTotal.

JPCert analysts recognized that the risk actors deployed customized malware dubbed “ReadNimeLoader,” which serves as a classy loader particularly designed to execute Cobalt Strike payloads.

This loader, written within the Nim programming language, demonstrates superior anti-analysis methods and represents a big departure from typical malware deployment strategies.

Circulate of Cobalt Strike execution (Supply – JPCert)

The researchers famous that the malware chain includes authentic java.exe processes executing via scheduled duties, which subsequently load malicious DLL information via DLL sideloading methods.

Superior Anti-Evaluation Mechanisms

The ReadNimeLoader part incorporates 4 distinct anti-debugging methods that considerably complicate malware evaluation efforts.

These mechanisms embody monitoring the BeingDebugged worth within the Course of Surroundings Block (PEB), checking for CONTEXT_DEBUG_REGISTER values, measuring elapsed time differentials, and implementing exception-based debugging detection.

Significantly noteworthy is the malware’s key era course of, the place parts of the decryption key required for payload activation are embedded inside the anti-analysis features themselves.

This architectural choice ensures that until these protecting features execute correctly, the proper decryption key can’t be generated, successfully stopping static evaluation of the payload.

The decryption course of makes use of AES256-ECB mode encryption, with keys generated via a classy course of involving string decoding features.

The malware employs two distinct XOR-based decoding mechanisms, with later variations incorporating an extra decode02 operate, indicating ongoing growth and refinement by the risk actors.

Cross-platform enlargement of historically Home windows-focused malware represents a regarding development, notably as many Linux servers lack complete endpoint detection and response techniques, doubtlessly offering attackers with prolonged dwell time and expanded lateral motion alternatives inside compromised networks.

Increase your SOC and assist your group defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Actors, Cobalt, CrossC2, Expand, Linux, macOS, Operate, Strike, Threat, Tool

Post navigation

Previous Post: Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools
Next Post: Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities

Related Posts

Encrypting Data to Meet Global Privacy Law Requirements Cyber Security News
Hackers Use Legitimate Drivers to Kill Antivirus Processes and Lower The System’s Defenses Cyber Security News
Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches Cyber Security News
Mastering Intrusion Detection Systems – A Technical Guide Cyber Security News
Managing Data Subject Access Requests in Compliance Programs Cyber Security News
Reflectiz Now Available on the Datadog Marketplace Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Awards $250,000 Bounty for Chrome RCE Vulnerability Discovery
  • Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code
  • New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials
  • Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
  • F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Awards $250,000 Bounty for Chrome RCE Vulnerability Discovery
  • Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code
  • New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials
  • Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
  • F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News