Latest Update06/09/2024

Threats Feed

  1. Public

    Drokbk Malware: A Tool for COBALT MIRAGE's Cyber Arsenal

    The COBALT MIRAGE threat group is using Drokbk malware to target U.S. local government networks. The malware, written in .NET, consists of a dropper and a payload, with limited built-in functionality, primarily executing additional commands from the command and control (C2) server. The February 2022 intrusion began with a compromise of a VMware Horizon server using two Log4j vulnerabilities. Drokbk is deployed post-intrusion alongside other access mechanisms, such as Fast Reverse Proxy (FRPC) tool, for persistence within the victim's environment.

    read more about Drokbk Malware: A Tool for COBALT MIRAGE's Cyber Arsenal
  2. Public

    Unveiling the Actors behind COBALT MIRAGE: A Ransomware Incident Analysis

    The Secureworks Counter Threat Unit analyzed a ransomware incident involving the Iranian COBALT MIRAGE threat group. The group exploited ProxyShell vulnerabilities, used a customized variant of Fast Reverse Proxy (FRPC) named TunnelFish, and encrypted servers using BitLocker. Despite attempts to erase their digital footprint, several tools and artifacts were recoverable, leading to the identification of associated individuals and entities, including Ahmad Khatibi, CEO of Afkar System Co., and Mansour Ahmadi, CEO of Najee Technology.

    read more about Unveiling the Actors behind COBALT MIRAGE: A Ransomware Incident Analysis