Highlights from the Insikt Group Cobalt Strike technical profile include:

  • A background on Cobalt Strike including when it changed from a pentesting tool to a popular hacking tool for state-sponsored threat actors
  • Details on the Cobalt Strike capabilities, observed threat actor use, host-based and network-based detections
  • Resources and mitigation tips in the event that Cobalt
    Strike is identified