{"id":22769,"date":"2022-08-03T22:48:51","date_gmt":"2022-08-03T22:48:51","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22769"},"modified":"2022-08-04T16:18:17","modified_gmt":"2022-08-04T16:18:17","slug":"cobalt-strike-inspires-next-generation-crimeware","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/","title":{"rendered":"Cobalt Strike Inspires Next-generation Crimeware"},"content":{"rendered":"\n<p>Cobalt Strike is a legitimate <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">vulnerability scanning<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\">pentesting tool<\/a> that has long been a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-cobalt-strike-became-a-favorite-tool-of-hackers\/\">favorite tool of hackers<\/a>, and it&#8217;s even been adapted by hackers for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/new-cobalt-strike-beacon-variant-targets-linux\/\">Linux environments<\/a>.<\/p>\n\n\n\n<p>And now it&#8217;s inspiring imitators.<\/p>\n\n\n\n<p>Cisco Talos researchers have <a href=\"https:\/\/blog.talosintelligence.com\/2022\/08\/manjusaka-offensive-framework.html\" target=\"_blank\" rel=\"noreferrer noopener\">disclosed<\/a> a new toolset used in the wild by threat actors as an alternative to Cobalt Strike or Silver. Dubbed \u201cManjusaka,\u201d which can be translated as \u201ccow flower,\u201d the framework has the potential to become \u201cprevalent across the threat landscape,\u201d according to researchers.<\/p>\n\n\n\n<p>The software is shipped with advanced offensive capabilities that are very similar to Cobalt Strike, such as C2 (Command and Control) infrastructure, EXE and ELF implants, RAT (Remote Access Trojan), and many more.<\/p>\n\n\n\n<p>The code is mostly written in Go for the C2 and Rust for the implants, two top modern programming languages with great features such as cheaper running costs, faster debugging, concurrency, easy packaging, and high compatibility across various systems.<\/p>\n\n\n\n<p>Researchers have been observing new features in Manjusaka since its first public release in March 2022, which suggests an active development cycle. The developers provide a free version of the C2 binary, as a demo copy for evaluation with limited functionalities, and a design diagram to explain how the components communicate to each other:<br><img decoding=\"async\" width=\"623.7762014865875\" height=\"492.74020206928253\" src=\"https:\/\/lh3.googleusercontent.com\/7yHa1gD1Q4atm8pU7rQStYpRo-gnXnaWRgil4OL1cFdBxS7vSjAFor5fdd0B_D_3T4BjfidmfFIKnrxf-33aLxSqA0zgJZlHg5_JF3QXm4obHK5KWCjNVxHD9lrDuvK_SnDCkS39_01t3INH71OZ-A\"><\/p>\n\n\n\n<p>Researchers found evidence that the authors might be located in the Guangdong region of China.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">Top Vulnerability Scanning Tools<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Malicious Actors Need New Post-exploitation Frameworks<\/strong><\/h2>\n\n\n\n<p>Manjusaka can be used as an alternative to Cobalt Strike but also in parallel to it. Researchers discovered the tool while inspecting a malicious Microsoft Word Document, also known as \u201cmaldoc,\u201d that contained a fake report of a COVID-19 outbreak but also a Cobalt Strike beacon.<\/p>\n\n\n\n<p>The document itself had nothing extravagant for a maldoc, as the hackers leveraged <a href=\"https:\/\/www.esecurityplanet.com\/threats\/hackers-find-alternatives-to-microsoft-office-macros\/\">macros<\/a> to fetch malicious <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-use-payloads-to-take-over-your-machine\/\">payloads<\/a> and load them in memory. However, researchers found an implant written in Rust that contacted the same IP address as the Cobalt Strike beacon and a \u201cfully functional C2 ELF,\u201d written in Go. The analysis revealed it can generate implants according to specific configurations, a functionality you typically find in Cobalt Strike.<\/p>\n\n\n\n<p>Researchers also found samples for Windows and Linux. Indeed, the implant feature is available as both EXE and ELF, with RAT functionalities such as arbitrary commands (through cmd.exe) and advanced discovery (foothold, TCP\/UDP sniffing, credential thefts), and a file management module that can enumerate, create, move, or delete directories and paths.<\/p>\n\n\n\n<p>Such fully-packed crimeware is particularly attractive for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">APT groups<\/a> and other threat actors that need to speed up operations, especially when starting new campaigns. Because the tool is shared publicly, it\u2019s much harder for analysts and security vendors to attribute the attacks to a known organization.<\/p>\n\n\n\n<p>Cobalt Strike, which began as a security framework initially and has inspired Manjusaka, is also increasingly popular with cybercriminals. However, the multiple cracked versions used in the wild are not maintained and are more detectable.<\/p>\n\n\n\n<p>As a result, there are new opportunities for attack frameworks, and that&#8217;s where well-maintained tools like Manjusaka come in.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to Protect Against Manjusaka<\/strong><\/h2>\n\n\n\n<p>Defenders and security teams can download IoCs (Indicators Of Compromise) on the <a href=\"https:\/\/github.com\/Cisco-Talos\/IOCs\/tree\/main\/2022\/08\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco-Talos repository<\/a>.<\/p>\n\n\n\n<p>Next-gen frameworks provide ever-growing capabilities and can evade classic detection by establishing rogue communication channels to transmit further instructions.<\/p>\n\n\n\n<p>The developers made sure that the interface to pass commands is easy to use. Once the parameters are set, users can press the \u201cgenerate button\u201d:<br><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/gHuwqkqJ9X80JMUjY-oQN5Gn8WA0MJ-sVVVj-NcTXih5EX9H7-dQ60gQ0jXKcMZTqGRlnkuuUBLbiVzVT9D4QqqYCv-HaSVSvdipIG7gxdETnqRfFjPPAf5O-6Y4Okr3dz_eyS1SVhLyunnK3I2EIA\" width=\"592\" height=\"367\"><\/p>\n\n\n\n<p>Researchers found the same features in Windows and Linux binaries, and a copy of the C2 server used by the attackers on <a href=\"https:\/\/github.com\/YDHCUI\/manjusaka\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a>.<\/p>\n\n\n\n<p>The developers probably made the effort of using modern programming languages and imitated the most popular legitimate frameworks to target more threat actors and operating systems.<\/p>\n\n\n\n<p>Layered security is strongly recommended, which can include strong password policy, aggressive <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch management<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">network segmentation<\/a>, and the least privilege principle, or &#8220;<a href=\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\">zero trust<\/a>.&#8221;&nbsp;<\/p>\n\n\n\n<p>It\u2019s critical to <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">monitor endpoint activity<\/a> to spot unusual processes and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">behaviors<\/a>. More than ever, there\u2019s a huge business for initial access and post-exploitation, and APT groups will likely continue to adopt new tools like Manjusaka to ease their work and cover their tracks.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">Top Endpoint Detection &amp; Response (EDR) Solutions<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fb176cb62-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fb176cb62\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fb176cb62\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fb176cb62\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fb176cb62\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fb176cb62\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fb176cb62\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cobalt Strike is a legitimate vulnerability scanning and pentesting tool that has long been a favorite tool of hackers, and it&#8217;s even been adapted by hackers for Linux environments. And now it&#8217;s inspiring imitators. Cisco Talos researchers have disclosed a new toolset used in the wild by threat actors as an alternative to Cobalt Strike [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":22771,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[1146,532,3414,31708,2478,730,10917,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788,382,403,404,31782],"class_list":["post-22769","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-malware","tag-microsoft","tag-network-security","tag-pentesting","tag-ransomware","tag-security","tag-vulnerability-scanning","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats","b2b_product-application-security-vulnerability-management","b2b_product-cyber-terrorists-and-cyber-crime","b2b_product-hackers","b2b_product-threat-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cobalt Strike Inspires Next-generation Crimeware | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Manjusaka is a new hacking tool linked to Chinese threat groups - and it&#039;s got considerable backing and development efforts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cobalt Strike Inspires Next-generation Crimeware | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Manjusaka is a new hacking tool linked to Chinese threat groups - and it&#039;s got considerable backing and development efforts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-03T22:48:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-04T16:18:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1086\" \/>\n\t<meta property=\"og:image:height\" content=\"859\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Cobalt Strike Inspires Next-generation Crimeware\",\"datePublished\":\"2022-08-03T22:48:51+00:00\",\"dateModified\":\"2022-08-04T16:18:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/\"},\"wordCount\":703,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png\",\"keywords\":[\"malware\",\"Microsoft\",\"network security\",\"pentesting\",\"ransomware\",\"security\",\"vulnerability scanning\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/\",\"name\":\"Cobalt Strike Inspires Next-generation Crimeware | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png\",\"datePublished\":\"2022-08-03T22:48:51+00:00\",\"dateModified\":\"2022-08-04T16:18:17+00:00\",\"description\":\"Manjusaka is a new hacking tool linked to Chinese threat groups - and it's got considerable backing and development efforts.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png\",\"width\":1086,\"height\":859,\"caption\":\"Manjusaka hacking tool\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cobalt Strike Inspires Next-generation Crimeware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cobalt Strike Inspires Next-generation Crimeware | eSecurity Planet","description":"Manjusaka is a new hacking tool linked to Chinese threat groups - and it's got considerable backing and development efforts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/","og_locale":"en_US","og_type":"article","og_title":"Cobalt Strike Inspires Next-generation Crimeware | eSecurity Planet","og_description":"Manjusaka is a new hacking tool linked to Chinese threat groups - and it's got considerable backing and development efforts.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/","og_site_name":"eSecurity Planet","article_published_time":"2022-08-03T22:48:51+00:00","article_modified_time":"2022-08-04T16:18:17+00:00","og_image":[{"width":1086,"height":859,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Cobalt Strike Inspires Next-generation Crimeware","datePublished":"2022-08-03T22:48:51+00:00","dateModified":"2022-08-04T16:18:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/"},"wordCount":703,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png","keywords":["malware","Microsoft","network security","pentesting","ransomware","security","vulnerability scanning","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/","url":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/","name":"Cobalt Strike Inspires Next-generation Crimeware | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png","datePublished":"2022-08-03T22:48:51+00:00","dateModified":"2022-08-04T16:18:17+00:00","description":"Manjusaka is a new hacking tool linked to Chinese threat groups - and it's got considerable backing and development efforts.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/manjusaka-design.png","width":1086,"height":859,"caption":"Manjusaka hacking tool"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/cobalt-strike-inspires-next-generation-crimeware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cobalt Strike Inspires Next-generation Crimeware"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22769"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22769"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22769\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22771"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22769"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22769"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22769"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}