{"id":25004,"date":"2022-07-07T08:20:37","date_gmt":"2022-07-07T12:20:37","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=25004"},"modified":"2022-07-07T08:20:37","modified_gmt":"2022-07-07T12:20:37","slug":"ransomware-hacking-groups-transition-to-brute-ratel-from-cobalt-strike","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/ransomware-hacking-groups-transition-to-brute-ratel-from-cobalt-strike\/","title":{"rendered":"Ransomware, Hacking Groups Transition To Brute Ratel From Cobalt Strike"},"content":{"rendered":"<p data-ar-index=\"0\"><span style=\"font-weight: 400;\">Hacking groups and ransomware operations are transitioning from Cobalt Strike to the newer Brute Ratel post-exploitation toolkit to avoid detection by EDR and antivirus solutions.<\/span><\/p>\n<p data-ar-index=\"1\"><span style=\"font-weight: 400;\">While Cobalt Strike is a legitimate software, hackers have been proliferating cracked versions online. It is thereby one of the most prominent tools used by hackers and ransomware operations to spread laterally through infected corporate networks.<\/span><\/p>\n<p data-ar-index=\"2\"><span style=\"font-weight: 400;\">Similar to Cobalt Strike, Brute Ratel is an oppositional attack simulation tool that enables red teamers to deploy &#8216;Badgers&#8217; (similar to beacons in Cobalt Strike) on remote hosts. These badgers connect back to the attacker&#8217;s Command and Control server to receive commands to execute or transmit the output of previously run commands.<\/span><\/p>\n<p data-ar-index=\"3\"><span style=\"font-weight: 400;\">In the latest report by Palo Alto Unit 42, researchers have detected hackers shifting from Cobalt Strike to using Brute Ratel as their preferred post-exploitation toolkit.<\/span><\/p>\n<p data-ar-index=\"4\"><span style=\"font-weight: 400;\">This shift in strategies is vital as BRc4 is made to evade detection by EDR and antivirus solutions, with virtually every security software not being able to detect it as malicious when first seen in the wild.<\/span><\/p>\n<p data-ar-index=\"5\"><span style=\"font-weight: 400;\">In attacks allegedly traced to the Russian state-sponsored hacking group APT29 (aka CozyBear and Dukes), threat actors distribute malicious ISOs that were said to contain a submitted r\u00e9sum\u00e9 (CV).<\/span><\/p>\n<p data-ar-index=\"6\"><span style=\"font-weight: 400;\">Once the Brute Ratel badger loads, the hackers can remotely access the compromised device to execute commands and proliferate further in the now-breached network.<\/span><\/p>\n<p data-ar-index=\"7\"><span style=\"font-weight: 400;\">Brute Ratel presently costs $2,500 per user for an annual license, with users asked to provide a business email address which they will need to verify before a license is issued.<\/span><\/p>\n<p data-ar-index=\"8\"><span style=\"font-weight: 400;\">Nevertheless, AdvIntel CEO Vitali Kremez says that former Conti ransomware members have also begun to obtain licenses through the creation of fake US companies to pass the licensing verification system.<\/span><\/p>\n<p data-ar-index=\"9\"><span style=\"font-weight: 400;\">&#8220;The criminals behind the former Conti ransomware operations explored multiple penetration testing kits beyond usage of Cobalt Strike,&#8221; Kremez added.<\/span><\/p>\n<p data-ar-index=\"10\">\n<p data-ar-index=\"11\"><span style=\"font-weight: 400;\">For more information, read the original story in Bleeping Computer. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking groups and ransomware operations are transitioning from Cobalt Strike to the newer Brute Ratel post-exploitation toolkit to avoid detection by EDR and antivirus solutions. While Cobalt Strike is a legitimate software, hackers have been proliferating cracked versions online. It is thereby one of the most prominent tools used by hackers and ransomware operations to [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[381,361,16],"tags":[],"class_list":["post-25004","post","type-post","status-publish","format-standard","hentry","category-operations","category-privacy","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/25004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=25004"}],"version-history":[{"count":1,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/25004\/revisions"}],"predecessor-version":[{"id":25005,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/25004\/revisions\/25005"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=25004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=25004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=25004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}