Skip to main content
See every side of every news story
Published loading...Updated

Threat Actors Leverage CrossC2 To Extend Cobalt Strike To Linux And MacOS - Cybernoz - Cybersecurity News

Summary by cybernoz.com
JPCERT/CC verified a number of events in which threat actors were seen using CrossC2, an unofficial extension tool that creates Cobalt Strike Beacons that work with Linux and macOS. This campaign, which targeted Active Directory (AD) infrastructures, involved the use of CrossC2 alongside established tools such as PsExec for lateral movement, Plink for SSH tunneling, and native Cobalt Strike payloads. Further analysis revealed the integration of …
DisclaimerThis story is only covered by news sources that have yet to be evaluated by the independent media monitoring agencies we use to assess the quality and reliability of news outlets on our platform. Learn more here.

3 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • There is no tracked Bias information for the sources covering this story.

Factuality 

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

The Hacker News broke the news in on Thursday, August 14, 2025.
Sources are mostly out of (0)

Similar News Topics

News
For You
Search
BlindspotLocal