{"id":7031,"date":"2021-09-29T15:53:25","date_gmt":"2021-09-29T22:53:25","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7031"},"modified":"2024-08-07T12:18:54","modified_gmt":"2024-08-07T19:18:54","slug":"reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/","title":{"rendered":"Reply-Chain Threadjacking Campaign Delivers Squirrelwaffle Loader and Cobalt Strike"},"content":{"rendered":"<h3><strong>Author: Seth Williams<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>1. Overview<\/h3>\n<p>On 13 September, security researchers discovered a malicious phishing campaign that uses reply-chain threadjacking to distribute a downloader known as Squirrelwaffle: an emerging threat that is delivered on the TR botnet and has the same infrastructure as that of the QakBot banking trojan.<sup>1<\/sup><\/p>\n<h3>2. Customer impact<\/h3>\n<p>Squirrelwaffle downloads the commercial penetration-testing product Cobalt Strike and uses it to deploy Beacon:<sup>2<\/sup> a program that lets attackers carry out command execution, key logging, file transfer, privilege escalation, port scanning, lateral movement, and other post-exploitation functions.<sup>3<\/sup><\/p>\n<h3>3. Campaign analysis<\/h3>\n<p>This campaign uses reply-chain threadjacking, where the malspam spoofs a legitimate user and impersonates a reply to an existing email. The same technique has been used in Emotet and QakBot campaigns.<sup>4<\/sup> The body of the email contains a URL that, when clicked, downloads a ZIP archive containing a malicious Microsoft Excel or Word document named as <i>diagram-{number}<\/i>, where <i>number<\/i> is a set of random digits.<\/p>\n<h3>4. Attack chain<\/h3>\n<p>After extracting and opening the downloaded file, the victim is prompted to enable content. If the victim complies, the content runs a macro, which executes a VBS file via cscript.exe. This VBS file contains an obfuscated PowerShell script, which attempts to connect to one of several command and control (C&amp;C) sites. Upon connecting, the script downloads Squirrelwaffle in the form of a DLL file: a loader that attempts to download Cobalt Strike.<sup>5<\/sup><\/p>\n<p><a href=\"\/wp-content\/uploads\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike-attack-chain.jpg\" data-lity=\"\"><img decoding=\"async\" class=\"alignnone wp-image-7014 size-large\" src=\"\/wp-content\/uploads\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike-attack-chain.jpg\" alt=\"\" \/><\/a><\/p>\n<h3>5. Vulnerabilities and mitigation<\/h3>\n<p>Malspam campaigns are a common distribution method for malware. Infoblox recommends the following precautions:<\/p>\n<ul>\n<li>Be cautious of emails from unfamiliar senders, and inspect all unexpected attachments before opening them.<\/li>\n<li>Always be suspicious of vague emails, especially those that include prompts to open attachments or click hyperlinks or hyperlinked text.<\/li>\n<li>Before clicking a hyperlink or hyperlinked text, pause the cursor over it to check the actual address. Alternatively, configure emails to be rendered as plain text rather than HTML.<\/li>\n<li>If accidental clicking of a hyperlink in a suspicious email immediately initiates an attempt to download a file, with a prompt for approval, do not allow the download. If the file is downloaded without a prompt, do not open the file\u2014delete it immediately.<\/li>\n<li>Never configure Microsoft Office to enable macros by default. Many malware families use macros as an infection vector.<\/li>\n<li>Do not enable macros in a Microsoft Office attachment, especially if the file has little or no content apart from the directions for enabling macros.<\/li>\n<\/ul>\n<h3>Endnotes<\/h3>\n<ol>\n<li><a href=\"https:\/\/twitter.com\/ffforward\/status\/1437752329462222851\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>https:\/\/twitter.com\/ffforward\/status\/1437752329462222851<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.cobaltstrike.com\/help-beacon\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>https:\/\/www.cobaltstrike.com\/help-beacon<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.cobalt_strike\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.cobalt_strike<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/security-soup.net\/squirrelwaffle-maldoc-analysis\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>https:\/\/security-soup.net\/squirrelwaffle-maldoc-analysis\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.malware-traffic-analysis.net\/2021\/09\/17\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>https:\/\/www.malware-traffic-analysis.net\/2021\/09\/17\/index.html<\/strong><\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Seth Williams &nbsp; 1. Overview On 13 September, security researchers discovered a malicious phishing campaign that uses reply-chain threadjacking to distribute a downloader known as Squirrelwaffle: an emerging threat that is delivered on the TR botnet and has the same infrastructure as that of the QakBot banking trojan.1 2. Customer impact Squirrelwaffle downloads the [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6728,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[553],"tags":[236,488,294,40,189],"class_list":{"0":"post-7031","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-campaign-briefs","8":"tag-cyberthreat","9":"tag-cyberthreat-intelligence-report","10":"tag-malspam","11":"tag-threat-intelligence","12":"tag-cybersecurity","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Squirrelwaffle: An Emerging Threat Delivered Via Reply-Chain Threadjacking | Cyber Campaign Brief<\/title>\n<meta name=\"description\" content=\"Squirrelwaffle downloads a commercial penetration-testing product and uses it to deploy a program allowing attackers to carry out command execution, key logging, file transfer, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reply-Chain Threadjacking Campaign Delivers Squirrelwaffle Loader and Cobalt Strike\" \/>\n<meta property=\"og:description\" content=\"Squirrelwaffle downloads a commercial penetration-testing product and uses it to deploy a program allowing attackers to carry out command execution, key logging, file transfer, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-29T22:53:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:18:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-09.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Reply-Chain Threadjacking Campaign Delivers Squirrelwaffle Loader and Cobalt Strike\",\"datePublished\":\"2021-09-29T22:53:25+00:00\",\"dateModified\":\"2024-08-07T19:18:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/\"},\"wordCount\":439,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-09.jpg\",\"keywords\":[\"Cyberthreat\",\"Cyberthreat intelligence report\",\"Malspam\",\"Threat Intelligence\",\"Cybersecurity\"],\"articleSection\":[\"Cyber Campaign Briefs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/\",\"name\":\"Squirrelwaffle: An Emerging Threat Delivered Via Reply-Chain Threadjacking | Cyber Campaign Brief\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-09.jpg\",\"datePublished\":\"2021-09-29T22:53:25+00:00\",\"dateModified\":\"2024-08-07T19:18:54+00:00\",\"description\":\"Squirrelwaffle downloads a commercial penetration-testing product and uses it to deploy a program allowing attackers to carry out command execution, key logging, file transfer, and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-09.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-09.jpg\",\"width\":612,\"height\":408,\"caption\":\"White graphic symbol of a lock on binary computer display - computer data protection. Internet Business Cyber security system concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Campaign Briefs\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Reply-Chain Threadjacking Campaign Delivers Squirrelwaffle Loader and Cobalt Strike\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Squirrelwaffle: An Emerging Threat Delivered Via Reply-Chain Threadjacking | Cyber Campaign Brief","description":"Squirrelwaffle downloads a commercial penetration-testing product and uses it to deploy a program allowing attackers to carry out command execution, key logging, file transfer, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/","og_locale":"en_US","og_type":"article","og_title":"Reply-Chain Threadjacking Campaign Delivers Squirrelwaffle Loader and Cobalt Strike","og_description":"Squirrelwaffle downloads a commercial penetration-testing product and uses it to deploy a program allowing attackers to carry out command execution, key logging, file transfer, and more.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/","og_site_name":"Infoblox Blog","article_published_time":"2021-09-29T22:53:25+00:00","article_modified_time":"2024-08-07T19:18:54+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-09.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Reply-Chain Threadjacking Campaign Delivers Squirrelwaffle Loader and Cobalt Strike","datePublished":"2021-09-29T22:53:25+00:00","dateModified":"2024-08-07T19:18:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/"},"wordCount":439,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-09.jpg","keywords":["Cyberthreat","Cyberthreat intelligence report","Malspam","Threat Intelligence","Cybersecurity"],"articleSection":["Cyber Campaign Briefs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/","name":"Squirrelwaffle: An Emerging Threat Delivered Via Reply-Chain Threadjacking | Cyber Campaign Brief","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-09.jpg","datePublished":"2021-09-29T22:53:25+00:00","dateModified":"2024-08-07T19:18:54+00:00","description":"Squirrelwaffle downloads a commercial penetration-testing product and uses it to deploy a program allowing attackers to carry out command execution, key logging, file transfer, and more.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-09.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-09.jpg","width":612,"height":408,"caption":"White graphic symbol of a lock on binary computer display - computer data protection. Internet Business Cyber security system concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/reply-chain-threadjacking-campaign-delivers-squirrelwaffle-loader-and-cobalt-strike\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Campaign Briefs","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-campaign-briefs\/"},{"@type":"ListItem","position":4,"name":"Reply-Chain Threadjacking Campaign Delivers Squirrelwaffle Loader and Cobalt Strike"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7031"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7031\/revisions"}],"predecessor-version":[{"id":7037,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7031\/revisions\/7037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6728"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}