Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Master New Tunneling Technique to Evade Detection
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Master New Tunneling Technique to Evade Detection

Highlights

  • ExCobalt uses GoRed for covert C2 communication.

  • GoRed employs DNS and ICMP tunneling techniques.

  • Advanced security measures are crucial to counter these threats.

Samantha Reed
Last updated: 21 June, 2024 - 12:16 pm 12:16 pm
Samantha Reed 11 months ago
Share
SHARE

Recent research by Positive Technologies has revealed that ExCobalt, a cyber espionage group, has been leveraging a sophisticated tool called GoRed to maintain persistent and covert communication with its command and control (C2) servers. This new technique involves the usage of DNS and ICMP tunneling to bypass network security measures undetected. The discovery highlights the evolving threat landscape where cyber adversaries continuously innovate to exploit vulnerabilities and maintain unauthorized access.

Contents
GoRed’s Advanced Tunneling CapabilitiesIncident Investigations and Variants

GoRed’s Advanced Tunneling Capabilities

ExCobalt, linked to the notorious Cobalt group known for targeting financial institutions, has adopted GoRed, a Go-based backdoor tool. Positive Technologies’ ESC CSIRT team identified this tool during an incident response for one of their clients. GoRed uses DNS and ICMP protocols to establish hidden communication routes for data exfiltration and receiving commands from C2 servers. This method not only helps in maintaining persistence but also avoids detection by conventional security systems.

Incident Investigations and Variants

The investigation into a compromised Linux host in March 2024 led to the identification of GoRed, compressed in a UPX file labeled scrond. Multiple variants of this backdoor have been encountered, particularly during incident responses in July and October 2023. Alongside GoRed, other tools like Mimikatz, ProcDump, SMBExec, and Metasploit were also found, indicating a complex and multi-faceted attack strategy by ExCobalt. These tools collectively enhance the group’s capability to harvest credentials, collect data, and perform reconnaissance on victim networks.

GoRed’s C2 servers, including domains like leo.rpm-bin.link and sula.rpm-bin.link, facilitate encrypted communication using RPC protocols with custom CBOR serialization and AES-256-GCM encryption. The backdoor maintains persistence by creating specific environment variables and continuously running background commands. The modular structure of GoRed allows it to adapt and evolve, adding new features for improved data collection and stealth operations.

ExCobalt’s strategy of using GoRed, a Go-based backdoor, marks a significant development in their cyber-espionage tactics. The use of DNS and ICMP tunneling helps them establish secure and concealed communication channels, making it challenging for security teams to detect and mitigate their presence. The continued enhancement of GoRed indicates that ExCobalt is actively investing in refining their tactics, techniques, and procedures (TTPs) to stay ahead of defensive measures.

Comparing this recent discovery with prior information, it becomes evident that ExCobalt has been consistently upgrading its toolset to exploit new vulnerabilities and avoid detection. The use of advanced tunneling techniques like DNS and ICMP reflects a broader trend among cyber adversaries to leverage less monitored and often overlooked protocols for their malicious activities. The identification of GoRed showcases the need for continuous vigilance and adaptation in cybersecurity practices to counter such sophisticated threats effectively.

Historically, ExCobalt, and its predecessor Cobalt, have been known for their targeted attacks on financial institutions and other high-value targets. The transition from earlier tools to GoRed demonstrates a strategic shift towards more covert and resilient methods of operation. This evolution underscores the importance of proactive threat hunting and advanced security measures to detect and neutralize emerging threats before they can cause significant damage.

Cybersecurity professionals must prioritize monitoring and securing less conventional communication protocols like DNS and ICMP. Implementing robust detection mechanisms, conducting regular threat assessments, and staying updated with the latest threat intelligence are crucial steps in mitigating the risks posed by advanced threat actors like ExCobalt. Understanding the behaviors and techniques used by such groups can help in developing more effective defensive strategies to protect critical assets and infrastructure.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Hackers Exploit Weak Passwords in Just an Hour
Next Article Hackers Use Facebook to Steal Your Passwords

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

North American Robot Orders Stabilize in Early 2025
Robotics
UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?