Payload Trends in Malicious OneNote Samples
Leveraging DNS Tunneling for Tracking and Scanning
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 (Updated May 3)
  • Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Research

Research Reports

2022 SecureIQLab: Command and Control Comparative Report

Jan 24, 2023
asset thumbnail

The Palo Alto Networks Unit 42 threat research team has observed more than a 73% increase in the use of Red Team tools such as Cobalt Strike by threat actors1. These tools are purpose-built to obfuscate network payloads and emulate real-world traffic to avoid detection. It is imperative that organizations today employ security solutions to protect against these kinds of sophisticated threats.

In an effort to understand the breadth of coverage for attacks conducted by red team tools, SecureIQLab was commissioned to test the ability of next-generation firewalls to block the command-and-control capabilities of the Cobalt Strike attack suite. In this report, the Palo Alto Networks Advanced Threat Prevention subscription was compared to CheckPoint, Cisco and Fortinet solutions.

About the Report

  • SecureIQLab tested the ability of next-generation firewalls to block the command-and-control capabilities of the Cobalt Strike attack suite, which is popular among adversaries
  • Four physical and two virtual firewalls were tested: Check Point SG5100, Cisco Secure Firewall 4110, Fortinet FG-301E, Fortinet FG-VM04V, Palo Alto Networks PA-460, and Palo Alto Networks PA-VM-Flex
  • The test measured the block rate of each firewall in six attack scenarios: Basic attack, random attack, custom attack, nonstandard ports-based attack, HTTPS attack, hostname change attack
  • All scenarios except for the basic attack scenario leveraged "malleable C2 profiles" which are highly customized attack profiles. This technique allows adversaries to modify Cobalt Strike to evade signature-based detections

* https://paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/unit42-network-threat-research-report-vol1.pdf

Download
Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy Statement
  • Trust Center
  • Terms of Use
  • Documents
  • Do Not Sell or Share My Personal Information

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2024 Palo Alto Networks. All rights reserved