Striking Back at Cobalt: Using Network Traffic Metadata to Detect Cobalt Strike Masquerading Command and Control Channels

Clément Parssegny, Johan Mazel, Olivier Levillain, Pierre Chifflier

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Off-the-shelf software for Command and Control is often used by attackers and legitimate pentesters looking for discretion. Among other functionalities, these tools facilitate the customization of their network traffic so it can mimic popular websites, thereby increasing their secrecy. Cobalt Strike is one of the most famous solutions in this category, used by known advanced attacker groups such as “Mustang Panda” or “Nobelium”. In response to these threats, Security Operation Centers and other defense actors struggle to detect Command and Control traffic, which often use encryption protocols such as TLS. Network traffic metadata-based machine learning approaches have been proposed to detect encrypted malware communications or fingerprint websites over Tor network. This paper presents a machine learning-based method to detect Cobalt Strike Command and Control activity based only on widely used network traffic metadata. The proposed method is, to the best of our knowledge, the first of its kind that is able to adapt the model it uses to the observed traffic to optimize its performance. This specificity permits our method to performs equally or better than the state of the art while using standard features thus easier to use in a production environment and more explainable.

Original languageEnglish
Title of host publicationAvailability, Reliability and Security - 20th International Conference, ARES 2025, Proceedings
EditorsMila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
PublisherSpringer Science and Business Media Deutschland GmbH
Pages163-185
Number of pages23
ISBN (Print)9783032006233
DOIs
Publication statusPublished - 1 Jan 2025
Event20th International Conference on Availability, Reliability and Security, ARES 2025 - Ghent, Belgium
Duration: 11 Aug 202514 Aug 2025

Publication series

NameLecture Notes in Computer Science
Volume15992 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th International Conference on Availability, Reliability and Security, ARES 2025
Country/TerritoryBelgium
CityGhent
Period11/08/2514/08/25

Keywords

  • Cobalt Strike
  • Command and Control
  • Detection
  • Machine Learning
  • Network Metadata

Fingerprint

Dive into the research topics of 'Striking Back at Cobalt: Using Network Traffic Metadata to Detect Cobalt Strike Masquerading Command and Control Channels'. Together they form a unique fingerprint.

Cite this