Explore our library of thought leadership articles and insights.
Podcasts
Stream informative and exclusive episodes of DomainTools “Breaking Badness” podcast.
Research
Read the latest from DomainTools Investigations.
Webinars
Watch live and on-demand cybersecurity training from the DomainTools team.
White Papers
Discover the real-world impact of DomainTools DNS intelligence.
Client Resources
Technical Documentation
Navigate DomainTools features effortlessly with our comprehensive guides.
API Documentation
Access everything you need, including endpoint, response formats, sample queries, and product service levels.
Webinars
Through close partnerships with leading security vendors, DomainTools embeds our best-in-class domain profiles and predictive Risk Score directly within your preferred SIEM, SOAR, and TIP solutions.
Watch Now
Company
About
Meet our exceptional executive team of experts and industry leaders.
Pressroom
Access the latest DomainTools news and press coverage.
Contact
We’re here to help with product info, pricing, and current and future account services.
Hacking groups and ransomware operations are moving away from Cobalt Strike to the newer Brute Ratel post-exploitation toolkit to evade detection by endpoint detection and response (EDR) and antivirus solutions
Cobalt Strike came into the picture as a red team tool, meant for legitimate pen testers and red teams to use in their work simulating attacks
It’s extremely effective, and so cracked versions of it have been out there for years being used by adversaries all over the place
It allows you to have compromised devices beacon out to command and control, and carry out all kinds of surveillance within the victim environment
Brute Ratel entered then entered the picture (released as “Brute Ratel Command and Control Center” or BRc4) as an alternative to Cobalt Strike for red team penetration testing engagements
There’s evidence that some APT activity from the likes of Cozy Bear (APT 29) and also ransomware action from former Conti folks are using Brute Ratel
Cobalt Strike has been extremely popular, so there’s incentive to detect it
Brute Ratel, though, is designed to be much more elusive when it comes to those detections
Brute Ratel is supposed to only be sold to legitimate businesses
There’s a bit of a vetting process where the developer manually checks customers wishing to obtain a copy of it (and they go for $2,500 a pop)
Obviously, it has leaked
The developer claims it was done by a disgruntled customer, but there’s some evidence that there’s other deception going on here, where some threat actors are just concocting fake US companies and using those “company” emails to get a hold of copies
For now, while there is a low detection rate, really all you can do in terms of mitigations is to be very tight on all other means of detection you have, understanding of course that Brute Ratel (or Cobalt Strike) is not the the threat actor’s objective but just one of the tools to get them there—you have possibilities of detection in various stages of the operation
It really comes down to the tried and true advice that it seems we give all the time, but it’s still pretty key
Have all your defenses tuned as well as possible. Have your users on the lookout. Don’t re-enable macros in Microsoft even though they are threatening to reverse themselves on the default enabling of those. Monitor for suspicious domain registrations!
CISA, the FBI, and the US Treasury said we can expect to see continued attacks on healthcare systems
CISA issued an advisory regarding this attack including technical details as well as mitigations
Two Truths and a Lie
Introducing our newest segment on Breaking Badness. We are going to play a game you are all likely familiar with called two truths and a lie, with a fun twist. Each week, one us with come prepared with three article titles, two of which are real, and one is, you guessed it, A LIE.
You'll have to tune in to find out!
Current Scoreboard
This Week’s Hoodie/Goodie Scale
et tu, Brute Ratel??
[Tim]: 6/10 Hoodies [Taylor]: 7.5/10 Hoodies
Maui Wowie
[Tim]: 3/10 Hoodies [Taylor]: 4.23/10 Hoodies
That’s about all we have for this week, you can find us on Twitter @domaintools, all of the articles mentioned in our podcast will always be included on our podcast recap. Catch us Wednesdays at 9 AM Pacific time when we publish our next podcast and blog.
*A special thanks to John Roderick for our incredible podcast music!