{"id":39047,"date":"2021-01-07T22:50:00","date_gmt":"2021-01-07T22:50:00","guid":{"rendered":"https:\/\/www.darkreading.com\/risk\/cobalt-strike-and-metasploit-tools-were-attacker-favorites-in-2020\/d\/d-id\/1339854"},"modified":"2021-01-07T22:50:00","modified_gmt":"2021-01-07T22:50:00","slug":"cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/","title":{"rendered":"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header><\/header>\n<p><span class=\"strong black\">Research reveals APT groups and cybercriminals employ these offensive security tools as often as red teams.<\/span><\/p>\n<p class>Cobalt Strike and Metasploit were the offensive security tools most commonly used to host malware command-and-control (C2) servers in 2020, researchers report.<\/p>\n<p>Researchers with Recorded Future&#8217;s Insikt Group collected more than 10,000 unique C2 servers across at least 80 malware families last year. Cobalt Strike accounted for 1,441 of the C2 servers and Metasploit made up 1,122; combined, they made up 25% of the total C2 servers. Detections of unaltered Cobalt Strike deployments represented 13.5% of C2 servers identified.&nbsp;<\/p>\n<p>Offensive security tools, also known as penetration testing tools and red teaming tools, have become part of attackers&#8217; toolkits in recent years. Some of these tools mimic an attackers&#8217; activity, and attack groups noticed an opportunity to blend in with typical penetration tests.&nbsp;<\/p>\n<p>Nearly all of the offensive security tools researchers detected in C2 infrastructure have been connected to APT or advanced financial actors. Cobalt Strike is a favorite among APT41 and Mustang Panda, both associated <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/indictments-unlikely-to-deter-chinas-apt41-activity-\/d\/d-id\/1338952\" target=\"_blank\" rel=\"noopener noreferrer\">with China<\/a>, as well as Ocean Lotus, believed to be a <a href=\"https:\/\/www.darkreading.com\/endpoint\/5-year-long-cyber-espionage-campaign-hid-in-google-play\/d\/d-id\/1337676\" target=\"_blank\" rel=\"noopener noreferrer\">Vietnamese APT group<\/a>, and <a href=\"https:\/\/www.darkreading.com\/analytics\/fin7-cybercrime-gang-rises-again-\/d\/d-id\/1334228\" target=\"_blank\" rel=\"noopener noreferrer\">cybercrime gang<\/a> FIN7. Metasploit is popular among APT Group <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/evilnum-apt-group-employs-new-python-rat\/d\/d-id\/1338843\" target=\"_blank\" rel=\"noopener noreferrer\">Evilnum<\/a> and Turla, a stealthy APT group associated <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/russia-based-turla-apt-groups-infrastructure-activity-traceable\/d\/d-id\/1337306\" target=\"_blank\" rel=\"noopener noreferrer\">with Russia<\/a>.<\/p>\n<p>Greg Lesnewich, senior intelligence analyst at Recorded Future, says it&#8217;s interesting to see Metasploit prove popular with both Turla, a sophisticated espionage group, and Evilnum, a mercenary group that <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2020_deathstalker-detailed-look-at-a-mercenary-apt-group-that-spies-on-small-and-medium-businesses\" target=\"_blank\" rel=\"noopener noreferrer\">targets<\/a> small and midsize businesses with corporate espionage.<\/p>\n<p>&#8220;These high-end groups use [these tools], and every time they do it makes headlines,&#8221; he says. &#8220;They&#8217;re obviously getting utility out of them, but they&#8217;re still being developed and regularly available.&#8221;<\/p>\n<p>More than 40% of the offensive security tools researchers detected were open source, they note.<\/p>\n<p>The accessibility and maintenance of these tools make them appealing to attackers of all skill levels, he continues. Metasploit is a well-maintained offensive tool developed by Rapid7. Cobalt Strike, while not technically open source, has several versions floating around the Internet after its source code was leaked. Red teams usually buy the tool, but it&#8217;s available for anyone to use \u2013 and there are guides on the Web to instruct those who don&#8217;t know how to effectively use it.<\/p>\n<p>Both Metasploit and Cobalt Strike &#8220;can do much for post-exploitation; they can do so much for initial access,&#8221; Lesnewich explains. &#8220;Conducting full-length intrusions, mostly through either of these tools, saves [attackers] from having to develop their own stuff as well as makes them look like other actors the tools appeal to.&#8221;<\/p>\n<p>This benefits everyone: Low-skill attackers can run operations, while high-skill attackers&nbsp;blend in with a company&#8217;s offensive security practices and benefit from good functionality. As the Insikt Group wrote in a blog post, &#8220;the ease of access and use of these tools, mixed with the murkiness of potential attribution, makes them appealing for unauthorized intrusions and red teams alike.&#8221;<\/p>\n<p>There are reasons attack groups may not need these tools. They may have a narrowly focused goal that doesn&#8217;t warrant multifunctionality. For example, if they&#8217;re targeting a person and not an enterprise, they may not need to fully inspect a target device or pivot from victim to victim.&nbsp;<\/p>\n<p>Lesnewich calls both Cobalt Strike and Metasploit &#8220;very purple-team friendly.&#8221; While both do a lot to evade detection, they&#8217;re not shy about showing defenders how to detect and track their deployments. <a href=\"https:\/\/www.recordedfuture.com\/2020-adversary-infrastructure-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">Recorded Future&#8217;s report<\/a>, which lists the 10 most commonly used offensive security tools, can be used to inform C2, host-based, and network-based detections, he says.<\/p>\n<p>&#8220;Even though all the groups mentioned could develop their own post-exploitation or C2 framework, the hidden benefit to defenders is how much documentation is written to detect these things,&#8221; he explains.<\/p>\n<p>With this documentation, blue teams can practice for things on this list that have open source code but aren&#8217;t very common. Lesnewich says progress is being made toward tracking custom malware families that aren&#8217;t quite as popular but are still active.<\/p>\n<p>&#8220;Finding these things on the Internet doesn&#8217;t necessarily have to be the defender&#8217;s priority, but the volume we observe can help create the prioritization list for their work internally,&#8221; he says.<\/p>\n<p>Lesnewich&nbsp;advises security teams to create a prioritization list to observe previous threat reporting. Tools he recommends include <a href=\"https:\/\/virustotal.github.io\/yara\/\" target=\"_blank\" rel=\"noopener noreferrer\">Yara<\/a>, an open source detection tool for endpoint threats, and <a href=\"https:\/\/www.snort.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Snort<\/a>, the network detection equivalent.<\/p>\n<p>Secondary to this, Lesnewich suggests taking a closer look inside the company&#8217;s SIEM and SOAR platforms to detect unusual behavior&nbsp;\u2013 for example, if two endpoints should be communicating with a server but instead are communicating with each other.&nbsp;<\/p>\n<p>Tracking the malicious use of offensive security tools is only one step in the defensive security process, he adds. These are a powerful way for defenders to get comfortable with how they can do detection and observe the ins and outs of good tooling. From there, they can begin to track other threats including Emotet and Trickbot, and other things that make noise in the environment.<\/p>\n<p><span class=\"italic\">Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance &amp; Technology, where she covered financial &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=837\">View Full Bio<\/a><\/span><\/p>\n<p><strong>Recommended Reading:<\/strong><\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/risk\/cobalt-strike-and-metasploit-tools-were-attacker-favorites-in-2020\/d\/d-id\/1339854?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research reveals APT groups and cybercriminals employ these offensive security tools as often as red teams. Read More <a href=\"https:\/\/www.darkreading.com\/risk\/cobalt-strike-and-metasploit-tools-were-attacker-favorites-in-2020\/d\/d-id\/1339854?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-39047","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-07T22:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020\",\"datePublished\":\"2021-01-07T22:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/\"},\"wordCount\":893,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/\",\"name\":\"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\",\"datePublished\":\"2021-01-07T22:50:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/#primaryimage\",\"url\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\",\"contentUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/","og_locale":"en_US","og_type":"article","og_title":"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-07T22:50:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020","datePublished":"2021-01-07T22:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/"},"wordCount":893,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/","url":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/","name":"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","datePublished":"2021-01-07T22:50:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","contentUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cobalt-strike-metasploit-tools-were-attacker-favorites-in-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cobalt Strike &amp; Metasploit Tools Were Attacker Favorites in 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39047"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39047\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}