The Apple MacOS Systems Are Being Attacked by Hackers Using Golang Variant of Cobalt Strike
The Apple MacOS Systems Are Being Attacked by Hackers Using Golang Variant of Cobalt Strike
The Apple MacOS Systems Are Being Attacked by Hackers Using Golang Variant of Cobalt Strike
Cobalt Strike
The emergence of Geacon, a Golang implementation of Cobalt Strike, is expected to attract the attention
of threat actors targeting Apple macOS systems, according to SentinelOne's findings. The security
researchers at SentinelOne have observed an increase in the number of Geacon payloads appearing on
VirusTotal in recent months, and while some may be part of legitimate red-team operations, others exhibit
characteristics of genuine malicious attacks.
Cobalt Strike, developed by Fortra, is a well-known tool used for red teaming and adversary simulation.
Over the years, cracked versions of the software have been illicitly exploited by threat actors due to its
extensive capabilities. However, it is worth noting that while post-exploitation activities associated with
Cobalt Strike have primarily targeted Windows systems, attacks against macOS are relatively rare.
In May 2022, Sonatype, a software supply chain firm, disclosed information about a malicious Python
package called "pymafka." This package was specifically designed to deploy a Cobalt Strike Beacon on
compromised Windows, macOS, and Linux systems.
However, the introduction of Geacon artifacts in the wild may change the landscape. Geacon is a Go
programming language variant of Cobalt Strike, and it has been available on GitHub since February 2020.
Further analysis of two new samples uploaded to VirusTotal in April 2023 has revealed their association
with Geacon. These samples correspond to two Geacon variants named geacon_plus and geacon_pro,
which were developed in late October by two anonymous Chinese developers known as z3ratu1 and
H4de5.
While the geacon_pro project is no longer accessible on GitHub, an Internet Archive snapshot from
March 6, 2023, reveals its capability to evade detection by antivirus engines such as Microsoft Defender,
Kaspersky, and Qihoo 360 360 Core Crystal.
H4de5, the developer of geacon_pro, has stated that the tool is primarily designed to support CobaltStrike
versions 4.1 and later, while geacon_plus is compatible with CobaltStrike version 4.0. The current version
of CobaltStrike is 4.8.
These findings are significant as the macOS ecosystem is currently being targeted by a range of threat
actors, including state-sponsored groups, who aim to deploy backdoors and steal sensitive information.
The increasing presence of Geacon samples in recent months highlights the importance for security teams
to be vigilant and ensure they have proper protections in place against this tool, as noted by the
researchers.