Positive Technologies researchers reported that a cybercrime gang called ExCobalt targeted Russian organizations in multiple sectors with a previously unknown Golang-based backdoor known as GoRed.<\/p>\n\n\n\n
Members of the ExCobalt group have been active since at least 2016, the researchers believe that the group is linked to the notorious Cobalt Gang<\/a>.<\/p>\n\n\n\n
The Cobalt’s hallmark was the use of the CobInt tool<\/a>, the same tool that ExCobalt began using in 2022.<\/p>\n\n\n\n
The GoRed backdoor supports several notable features. It allows operators to connect and execute commands, similar to other Command and Control (C2) frameworks such as Cobalt Strike<\/a> or Sliver. The communication between GoRed and its C2 server relies on the RPC protocol. For secure communication, operators employ DNS\/ICMP tunneling, WSS, and QUIC protocols.<\/p>\n\n\n\n
The group exploited the following vulnerabilities for privilege escalation: CVE-2022-2586, CVE-2021-3156<\/a>, CVE-2021-4034<\/a>, CVE-2019-13272<\/a>, CVE-2022-27228, CVE-2021-44228, CVE-2021-40438<\/a>, CVE-2023-3519<\/a>, BDU:2023-05857, and CVE-2019-12725<\/a>.<\/p>\n\n\n\n
“ExCobalt continues to\u00a0demonstrate a\u00a0high level of\u00a0activity and determination in\u00a0attacking Russian companies, constantly adding new tools to\u00a0its arsenal and improving its techniques. Not only is\u00a0it\u00a0developing new attack methods, but it’s also actively improving its existing tools, such as\u00a0the\u00a0GoRed<\/strong>\u00a0backdoor.” concludes the report<\/strong><\/a>.<\/em><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a> \u2013<\/strong> hacking, newsletter)<\/strong>