Project Hyphae
Search

Brute Ratel Replacing Cobalt Strike as Attackers’ Preferred Post-Exploitation Toolkit

Share This Post

Cobalt Strike has for years been one of the most popular toolkits used by attackers to deploy command and control (C2) beacons onto compromised devices. These beacons can perform network surveillance, allow remote access, and execute commands, including the activation of ransomware payloads. Red teamers and penetration testers also make use of Cobalt Strike, and countless hours have been dedicated to various antivirus vendors being able to quickly and safely identify and block its actions. In a recent report by Palo Alto Unit 42, researches have noticed advanced persistent threat groups moving away from Cobalt Strike and instead opting to use Brute Ratel for their post-exploitation activities.

Some background: Brute Ratel Command and Control Center (BRc4) was released in 2020 as an alternative to Cobalt Strike for penetration testing. Similar to Cobalt Strike, Brute Ratel deploys beacons (known as ‘Badgers’) to compromised remote hosts. These badgers connect back to the attacker’s C2 server to receive instructions or transmit data. The primary difference for attackers is BRc4’s design and ability to evade detection by EDR and antivirus solutions. Unit 42’s report gives examples of this evasion, as their samples have gone undetected by various EDR and AV providers. There is also a dearth of related information from cybersecurity aggregates like VirusTotal.

Brute Ratel currenctly costs $2,500 per user for a one-year license, with customers required to provide a business email address and be verified. Brute Ratel’s pricing page explains that this verification is a manual process, raising questions about how the threat actors seen in the wild received software licenses. In Unit 42’s example, the license used in the attacks had been leaked by a disgruntled employee of one of Brute Ratel’s customers. This particular license was revoked, but other cybersecurity firms report that former ransomware gang members have been able to acquire Brute Ratel licenses using made up business details.

For additional details on Brute Ratel, its actions and known Indicators of Compromise, please see Unit 42’s report at: https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/



Reach out to our incident response team for help

More To Explore

Information Security News 4-22-2024

Cisco Duo Warns Third-Party Data Breach Exposed SMS MFA Logs Article Link: https://www.bleepingcomputer.com/news/security/cisco-duo-warns-third-party-data-breach-exposed-sms-mfa-logs/ Notorious Russian Hacking Unit Linked to Breach of Texas Water Facility Article

Information Security News 4-15-2024

Roku Disclosed a Security Incident Impacting 576,000 Accounts Article Link: https://securityaffairs.com/161765/data-breach/roku-second-data-breach.html FBI Warns of Massive Wave of Road Toll SMS Phishing Attacks Article Link: https://www.bleepingcomputer.com/news/security/fbi-warns-of-massive-wave-of-road-toll-sms-phishing-attacks/

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.