Skip to content

Cobalt Strike

Also known as: BEACON, CobaltStrike, Agentemis, cobeacon

Cobalt Strike is a commercial adversary simulation platform created by Raphael Mudge in 2012 and acquired by Fortra (formerly HelpSystems) in 2020. Licensed at roughly $5,900/year per operator, it's designed for red team engagements. Cracked copies have circulated since at least 2015, and by 2021 commodity crimeware operators were using it more than APT groups -- Proofpoint documented a 161% increase in malicious use between 2019 and 2020.

The platform deploys an implant called Beacon that communicates with a Linux-based Team Server. Beacon supports C2 over HTTP, HTTPS, DNS, SMB named pipes, and raw TCP, with configurable sleep intervals and jitter. Malleable C2 profiles let operators reshape all network indicators to mimic legitimate traffic like jQuery CDN requests or cloud API calls. Encryption uses RSA for initial key exchange and AES-256 for session traffic.

Post-exploitation capabilities cover most of the ATT&CK lifecycle: shellcode injection, built-in Mimikatz for credential dumping, Kerberos ticket manipulation, lateral movement via PsExec/WMI/WinRM, port scanning, and Beacon Object Files (BOFs) for in-process extension without spawning new processes. The sleep mask feature encrypts Beacon in memory between callbacks.

Cobalt Strike is used across the full range of threat actors. APT29 deployed custom Beacon loaders in the SolarWinds campaign. APT41 uses it as a first-stage payload in mixed espionage and financial operations. FIN7 and ransomware groups including Conti, LockBit, and BlackBasta rely on it for post-exploitation and lateral movement before encryption.

Law enforcement has pushed back hard. In 2023, Microsoft, Fortra, and Health-ISAC obtained a court order to seize infrastructure hosting cracked copies. Operation Morpheus in June 2024, led by the UK NCA and Europol across 7 countries, took down 593 servers in one week. Fortra reports an 80% reduction in unauthorized copies as of 2024.

Linked Threat Actors

APT29APT41FIN7ContiLockBitBlackBastaMustang PandaWinnti

C2 Infrastructure

Hosting/VPS92%
Business4%
ISP/Residential4%

Last 7 days

Apr 14, 2026
C2 Hosts: 12
Apr 13, 2026
C2 Hosts: 12
Apr 12, 2026
C2 Hosts: 14
Apr 11, 2026
C2 Hosts: 13
Apr 10, 2026
C2 Hosts: 6
Apr 9, 2026
C2 Hosts: 10
Apr 8, 2026
C2 Hosts: 19

Further Reading

Defining Cobalt Strike Components and BEACON

Mandiant's definitive component taxonomy. Precisely defines Team Server, Client, Beacon, Listeners, and Malleable C2 from both red team and IR perspectives.

cloud.google.com
Making Cobalt Strike Harder for Threat Actors to Abuse

Google's release of 165 open-source YARA rules targeting Cobalt Strike components across 34 release versions up to 4.7.

cloud.google.com
Cobalt Strike, a Defender's Guide (Part 1)

Grounded in real intrusion data. Covers which loaders deliver CS (IcedID, TrickBot, Qbot), what commands attackers actually run, and detection at each stage.

thedfirreport.com
Cobalt Strike, a Defender's Guide (Part 2)

Network detection deep dive: domain fronting, SOCKS proxy traffic, C2 pattern analysis, Sigma rules, JARM/JA3 fingerprinting, and RITA beaconing detection.

thedfirreport.com
Extracting Cobalt Strike Beacon Configurations

Walks through manual beacon config extraction. Covers the settings structure, encryption layers, and what each field means operationally (C2 URLs, sleep, jitter, watermark).

elastic.co
How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect

Best technical breakdown of the Malleable C2 DSL. Shows how profiles transform metadata encoding, URI structure, headers, and body formatting.

unit42.paloaltonetworks.com
Identifying Cobalt Strike Team Servers in the Wild

Internet-wide scanning methodology for finding active Team Servers. TLS certificate analysis, staging URI checksum8 detection, and behavioral fingerprinting.

unit42.paloaltonetworks.com
Cobalt Strike Metadata Encryption and Decryption

Protocol-level analysis of Beacon's RSA/AES key exchange, session key derivation, and how to decrypt captured C2 traffic given the private key.

unit42.paloaltonetworks.com
Cobalt Strike: Favorite Tool from APT to Crimeware

The landmark study quantifying CS's shift from APT tool to commodity crimeware. 161% increase in malicious use 2019-2020, dropping from 66% to 15% attributable to known actors.

proofpoint.com
MITRE ATT&CK: Cobalt Strike S0154

Canonical technique mapping spanning nearly every Enterprise ATT&CK tactic. Cross-references dozens of group profiles and campaign reports.

attack.mitre.org