• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
threat actors turn to sliver as open source alternative to

Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks

You are here: Home / General Cyber Security News / Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks
January 23, 2023

The genuine command-and-regulate (C2) framework recognised as Sliver is attaining far more traction from threat actors as it emerges as an open up resource choice to Cobalt Strike and Metasploit.

The results occur from Cybereason, which in-depth its internal workings in an exhaustive examination last 7 days.

Sliver, formulated by cybersecurity firm BishopFox, is a Golang-dependent cross-platform post-exploitation framework that’s created to be utilized by security specialists in their pink group functions.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Its myriad features for adversary simulation – like dynamic code generation, in-memory payload execution, and procedure injection – have also produced it an interesting instrument for menace actors on the lookout to get elevated obtain to the goal system on gaining an initial foothold.

Silver C2 Framework

In other words, the program is employed as a 2nd-phase to conduct following ways of the attack chain just after currently compromising a device working with 1 of the original intrusion vectors such as spear-phishing or exploitation of unpatched flaws.

“Silver C2 implant is executed on the workstation as stage two payload, and from [the] Sliver C2 server we get a shell session,” Cybereason scientists Loïc Castel and Meroujan Antonyan explained. “This session supplies multiple methods to execute commands and other scripts or binaries.”

A hypothetical attack sequence comprehensive by the Israeli cybersecurity firm displays that Sliver could be leveraged for privilege escalation, subsequent it up by credential theft and lateral motion to in the long run acquire in excess of the domain controller for the exfiltration of delicate facts.

Sliver has been weaponized in modern many years by the Russia-linked APT29 group (aka Cozy Bear) as very well as cybercrime operators like Shathak (aka TA551) and Exotic Lily (aka Projector Libra), the latter of which is attributed to the Bumblebee malware loader.

Silver C2 Framework

That said, Sliver is considerably from the only open resource framework to be exploited for destructive finishes. Past thirty day period, Qualys disclosed how many hacking teams, which include Turla, Vice Society, and Wizard Spider, have utilized Empire for article-exploitation and to extend their foothold in victim environments.

“Empire is an spectacular post exploitation framework with expansive capabilities,” Qualys security researcher Akshat Pradhan said. “This has led to it turning into a repeated preferred toolkit of numerous adversaries.”

Observed this article exciting? Follow us on Twitter  and LinkedIn to examine additional distinctive content material we put up.


Some areas of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News New Government Cyber Advice for £100bn UK Charity Sector
Next Post: Riot Games Halts Work After Cyber-Attack Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.