• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Inbound Connection from a Cobalt Strike IP Address

Risk Factors

Cobalt Strike is a publicly available and well known tool associated with pen testing, security assessments, and persistent, planned attacks. Inbound connections from Cobalt Strike servers might indicate attempts to discover vulnerabilities and install Cobalt Strike Beacon, which enables command-and-control (C&C) activity.

Kill Chain

Caution

Risk Score

60

Detection diagram
Next in Caution: Inbound Connection from a Suspicious IP Address

Attack Background

Cobalt Strike is an attack toolkit that is often associated with malicious activity. Attackers install the Cobalt Strike Beacon payload on a compromised device and the beacon initiates a connection to a C&C server, referred to as the Cobalt Strike team server. Cobalt Strike team servers are designed to receive communications from a compromised device but do not usually initiate connections. A connection from a known Cobalt Strike server might mean an attacker is repurposing the server to conduct reconnaissance or other malicious activity.

Mitigation Options

Block inbound and outbound traffic from suspicious IP addresses at the network perimeter
Quarantine the device while checking for the presence of malware

MITRE ATT&CK ID

What else can RevealX do for you?