SYMBOLCOMMON_NAMEaka. SYNONYMS

COBALT KATANA  (Back to overview)

aka: Hive0081 (IBM), Hunter Serpens, SectorD01 (NHSC), xHunt campaign (Palo Alto)

COBALT KATANA has been active since at least March 2018, and it focuses many of its operations on organizations based in or associated with Kuwait. The group has targeted government, logistics, and shipping organizations. The threat actors gain initial access to targets using DNS hijacking, strategic web compromise with SMB forced authentication, and password brute force attacks. COBALT KATANA operates a custom platform referred to as the Sakabota Framework, also referred to as Sakabota Core, with a complimentary set of modular backdoors and accessory tools including Gon, Hisoka, Hisoka Netero, Killua, Diezen, and Eye. The group has implemented DNS tunnelling in its malware and malicious scripts and also operates the HyphenShell web shell to strengthen post-intrusion access. CTU researchers assess with moderate confidence that COBALT KATANA operates on behalf of Iran, and elements of its operations such as overlapping infrastructure, use of DNS hijacking, implementation of DNS-based C2 channels in malware and web shell security mechanisms suggest connections to COBALT GYPSY and COBALT EDGEWATER.


Associated Families

There are currently no families associated with this actor.


References
2022-07-18Palo Alto Networks Unit 42Unit 42
Hunter Serpens
CASHY200 Snugy COBALT KATANA
2020-01-01SecureworksSecureWorks
COBALT KATANA
COBALT KATANA

Credits: MISP Project