• Book Dewayne Hart
  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
  • Speaker Bio
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
Facebook-f Linkedin-in Youtube X-twitter Globe
Order books

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

Posted on September 25, 2024 by admin

[ad_1]

Sep 25, 2024Ravie LakshmananPenetration Testing / Cyber Threat

Splinter Post-Exploitation Tool

Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild.

Palo Alto Networks Unit 42 shared its findings after it discovered the program on several customers’ systems.

“It has a standard set of features commonly found in penetration testing tools and its developer created it using the Rust programming language,” Unit 42’s Dominik Reichel said. “While Splinter is not as advanced as other well-known post-exploitation tools like Cobalt Strike, it still presents a potential threat to organizations if it is misused.”

Penetration testing tools are often used for red team operations to flag potential security issues in a company’s network. However, such adversary simulation tools can also be weaponized by threat actors to their advantage.

Cybersecurity

Unit 42 said it has not detected any threat actor activity associated with the Splinter tool set. There is no information as yet on who developed the tool.

Artifacts unearthed by the cybersecurity firm reveal that they are “exceptionally large,” coming in around 7 MB, primarily owing to the presence of 61 Rust crates within it.

Splinter is no different than other post-exploitation frameworks in that it comes with a configuration that includes information about the command-and-control (C2) server, which is parsed in order to establish contact with the server using HTTPS.

“Splinter implants are controlled by a task-based model, which is common among post-exploitation frameworks,” Reichel noted. “It obtains its tasks from the C2 server the attacker has defined.”

Some of the functions of the tool include executing Windows commands, running modules via remote process injection, uploading and downloading files, collecting cloud service account info, and deleting itself from the system.

“The increasing variety underscores the importance of staying up to date on prevention and detection capabilities, since criminals are likely to adopt any techniques that are effective for compromising organizations,” Reichel said.

The disclosure comes as Deep Instinct detailed two attack methods that could be exploited by threat actors to achieve stealthy code injection and privilege escalation by leveraging an RPC interface in Microsoft Office and a malicious shim, respectively.

“We applied a malicious shim in a process without registering an SDB file on the system,” researchers Ron Ben-Yizhak and David Shandalov said. “We effectively bypassed EDR detection by writing to a child process and loading the target DLL from the suspended child process before any EDR hook can be established.”

Cybersecurity

In July 2024, Check Point also shed light on a new process injection technique called Thread Name-Calling that allows to implant of a shellcode into a running process by abusing the API for thread descriptions while bypassing endpoint protection products.

“As new APIs are added to Windows, new ideas for injection techniques are appearing,” security researcher Aleksandra “Hasherezade” Doniec said.

“Thread Name-Calling uses some of the relatively new APIs. However, it cannot avoid incorporating older well-known components, such as APC injections – APIs which should always be taken into consideration as a potential threat. Similarly, the manipulation of access rights within a remote process is a suspicious activity.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Recent Posts

  • From Noise to ROI: Optimizing Cyber Risk Prioritization for Maximum Business Impact
  • Developing a Cybersecurity Mindset: Proactive Defense and Human Behavior Insights
  • How Military Discipline Enhances Cybersecurity Resilience
  • Secure to Scale: 7 Executive Strategies to Align Cybersecurity With Business Growth
  • No Blind Spots: A Veteran’s Blueprint to Protect Critical Infrastructure

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • July 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023

Categories

  • Cyber News
  • Uncategorized

Book Dewayne Hart for your next event

  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
Facebook-f Linkedin-in Youtube X-twitter Globe
© 2025 Dewayne Hart | Cybersecurity Leadership & Innovation
no_deposit_bonus