Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS

Posted on August 15, 2025August 16, 2025 By CWS

A classy risk marketing campaign has emerged that leverages CrossC2, an unofficial extension software that expands Cobalt Strike’s infamous capabilities past Home windows techniques to focus on Linux and macOS environments.

Between September and December 2024, cybersecurity incidents involving this cross-platform malware have been documented, representing a big evolution in risk actor techniques that historically targeted on Home windows-based infrastructure.

The assault marketing campaign demonstrates outstanding technical sophistication, using a multi-stage an infection chain that begins with authentic system processes and progressively deploys extra malicious elements.

Attackers utilized a mix of established instruments together with PsExec, Plink, and conventional Cobalt Strike alongside the novel CrossC2 extension, making a complete assault framework able to penetrating Lively Listing environments throughout a number of working techniques.

The marketing campaign’s attain extends past Japan, with proof suggesting comparable actions throughout a number of nations primarily based on submissions to VirusTotal.

JPCert analysts recognized that the risk actors deployed customized malware dubbed “ReadNimeLoader,” which serves as a classy loader particularly designed to execute Cobalt Strike payloads.

This loader, written within the Nim programming language, demonstrates superior anti-analysis methods and represents a big departure from typical malware deployment strategies.

Circulate of Cobalt Strike execution (Supply – JPCert)

The researchers famous that the malware chain includes authentic java.exe processes executing via scheduled duties, which subsequently load malicious DLL information via DLL sideloading methods.

Superior Anti-Evaluation Mechanisms

The ReadNimeLoader part incorporates 4 distinct anti-debugging methods that considerably complicate malware evaluation efforts.

These mechanisms embody monitoring the BeingDebugged worth within the Course of Surroundings Block (PEB), checking for CONTEXT_DEBUG_REGISTER values, measuring elapsed time differentials, and implementing exception-based debugging detection.

Significantly noteworthy is the malware’s key era course of, the place parts of the decryption key required for payload activation are embedded inside the anti-analysis features themselves.

This architectural choice ensures that until these protecting features execute correctly, the proper decryption key can’t be generated, successfully stopping static evaluation of the payload.

The decryption course of makes use of AES256-ECB mode encryption, with keys generated via a classy course of involving string decoding features.

The malware employs two distinct XOR-based decoding mechanisms, with later variations incorporating an extra decode02 operate, indicating ongoing growth and refinement by the risk actors.

Cross-platform enlargement of historically Home windows-focused malware represents a regarding development, notably as many Linux servers lack complete endpoint detection and response techniques, doubtlessly offering attackers with prolonged dwell time and expanded lateral motion alternatives inside compromised networks.

Increase your SOC and assist your group defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Actors, Cobalt, CrossC2, Expand, Linux, macOS, Operate, Strike, Threat, Tool

Post navigation

Previous Post: Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools
Next Post: Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities

Related Posts

Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide Cyber Security News
North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware Cyber Security News
Google Sues ‘Lighthouse’ Phishing-as-a-service Kit Behind Massive Phishing Attacks Cyber Security News
Hackers Allegedly Claim Breach Of HSBC USA Customers’ Records Including Financial Details Cyber Security News
Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls Cyber Security News
CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
  • APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
  • APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark