Cobalt Strike
![](https://v2.anonup.com/upload/avatars/2021/01/kWNE1MCx268AEHQOrSPE_21_1bde595524debe6b67abf471b0c3dd29_thumbnail_512x512.jpg)
In response Doq Holliday to his Publication
Colbalt Strike a threat to Healthcare..but the vax isn't a threat..no siree
https://www.hhs.gov/sites/default/files/cobalt-strike-tlpwhite.pdf
![](https://v2.anonup.com/upload/avatars/2021/01/JDZa7j6nPafABPodY8iW_21_7815535d5de996c5b61c8d532c704442_thumbnail_512x512.png)
In response Doq Holliday to his Publication
![](https://v2.anonup.com/upload/avatars/2021/01/EhRLgxJh3MLGobkgg9xO_10_fbe084f2c5132190d5a2744c9e4ddeac_thumbnail_512x512.jpg)
In response Doq Holliday to his Publication
Tracking Cobalt Strike Servers Used in Cyberattacks on Ukraine
https://securityboulevard.com/2022/05/tracking-cobalt-strike-servers-used-in-cyberattacks-on-ukraine/
Tracking Cobalt Strike Servers Used in Cyberattacks on Ukraine - Security Boulevard
On April 18, 2022, CERT-UA published alert #4490, which describes a malicious email campaign targeting Ukraine. The email attempts to deploy a Cobalt Strike beacon on the victim's system through the use of a MS Office macro. In the alert, CERT-UA provides a list of indicators of compromise (IoC..
https://securityboulevard.com/2022/05/tracking-cobalt-strike-servers-used-in-cyberattacks-on-ukraine/