Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS

Posted on August 15, 2025August 16, 2025 By CWS

A classy risk marketing campaign has emerged that leverages CrossC2, an unofficial extension software that expands Cobalt Strike’s infamous capabilities past Home windows techniques to focus on Linux and macOS environments.

Between September and December 2024, cybersecurity incidents involving this cross-platform malware have been documented, representing a big evolution in risk actor techniques that historically targeted on Home windows-based infrastructure.

The assault marketing campaign demonstrates outstanding technical sophistication, using a multi-stage an infection chain that begins with authentic system processes and progressively deploys extra malicious elements.

Attackers utilized a mix of established instruments together with PsExec, Plink, and conventional Cobalt Strike alongside the novel CrossC2 extension, making a complete assault framework able to penetrating Lively Listing environments throughout a number of working techniques.

The marketing campaign’s attain extends past Japan, with proof suggesting comparable actions throughout a number of nations primarily based on submissions to VirusTotal.

JPCert analysts recognized that the risk actors deployed customized malware dubbed “ReadNimeLoader,” which serves as a classy loader particularly designed to execute Cobalt Strike payloads.

This loader, written within the Nim programming language, demonstrates superior anti-analysis methods and represents a big departure from typical malware deployment strategies.

Circulate of Cobalt Strike execution (Supply – JPCert)

The researchers famous that the malware chain includes authentic java.exe processes executing via scheduled duties, which subsequently load malicious DLL information via DLL sideloading methods.

Superior Anti-Evaluation Mechanisms

The ReadNimeLoader part incorporates 4 distinct anti-debugging methods that considerably complicate malware evaluation efforts.

These mechanisms embody monitoring the BeingDebugged worth within the Course of Surroundings Block (PEB), checking for CONTEXT_DEBUG_REGISTER values, measuring elapsed time differentials, and implementing exception-based debugging detection.

Significantly noteworthy is the malware’s key era course of, the place parts of the decryption key required for payload activation are embedded inside the anti-analysis features themselves.

This architectural choice ensures that until these protecting features execute correctly, the proper decryption key can’t be generated, successfully stopping static evaluation of the payload.

The decryption course of makes use of AES256-ECB mode encryption, with keys generated via a classy course of involving string decoding features.

The malware employs two distinct XOR-based decoding mechanisms, with later variations incorporating an extra decode02 operate, indicating ongoing growth and refinement by the risk actors.

Cross-platform enlargement of historically Home windows-focused malware represents a regarding development, notably as many Linux servers lack complete endpoint detection and response techniques, doubtlessly offering attackers with prolonged dwell time and expanded lateral motion alternatives inside compromised networks.

Increase your SOC and assist your group defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Actors, Cobalt, CrossC2, Expand, Linux, macOS, Operate, Strike, Threat, Tool

Post navigation

Previous Post: Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools
Next Post: Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities

Related Posts

WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack Cyber Security News
Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders Cyber Security News
UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages Cyber Security News
Microsoft Confirms Error Entry in Windows Firewall With Advanced Security Cyber Security News
SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access Cyber Security News
5 Best IT Infrastructure Modernisation Services In 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256)
  • Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware
  • How to Secure Your Smart TV
  • Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst
  • Ransomware Actors Blending Legitimate Tools with Custom Malware to Evade Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256)
  • Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware
  • How to Secure Your Smart TV
  • Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst
  • Ransomware Actors Blending Legitimate Tools with Custom Malware to Evade Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News