Packet Pushers

Where Too Much Technology Would Be Barely Enough

  • Podcasts
    • Day Two Cloud
    • Full Stack Journey
    • Heavy Networking
    • Heavy Strategy
    • Heavy Wireless
    • IPv6 Buzz
    • Kubernetes Unpacked
    • Network Break
    • Tech Bytes
    • The Community Show
    • Datanauts (Retired)
    • Priority Queue (Retired)
  • Hosts
  • Articles
    • Tech Blogs
    • Industry News
    • SD-WAN Vendor List
    • Books And Whitepapers
    • Toolbox – IT Resource Collections
  • Library
  • Newsletter
  • Slack
  • Subscribe
  • Sponsor
You are here: Home / Blogs / Prisma Access Outperforms Against Cobalt Strike Attacks

Prisma Access Outperforms Against Cobalt Strike Attacks

Sponsored Blog Posts June 9, 2023

The following sponsored blog post was written by Anupam Upadhyaya at Palo Alto Networks. We thank Palo Alto Networks for being a sponsor.

Palo Alto Networks is the leading vendor in preventing Cobalt Strike C2 communication and blocked 99.2% of tested attacks, with the next leading vendor blocking only 17% of attacks, as cited in a recent report here.

The ever-evolving threat landscape makes it challenging for organizations to be confident in their security posture. In fact, we have seen a 100% year-over-year increase in attacks where threat actors leverage a zero-day exploit before vendors can patch them. Our Unit 42 team has reported more than a 73% increase in attackers using white hat hacking tools to perform command and control attacks, with “Cobalt Strike” as the leading attack. All of this makes it even more critical for companies to select cloud-delivered security tools that are easy to scale and provide zero-trust security. SecureIQ Lab published a study comparing three SSE offerings, concluding that Palo Alto Networks is the leading vendor in preventing Cobalt Strike C2 communication and blocked 99.2% of the five attack scenarios, with the next leading vendor blocking 17% of attacks.

Cobalt Strike Explained

While Cobalt Strike is a legitimate piece of software that is sold to white hat hackers to perform penetration tests, cracked versions have recently become easily available and are used by a wide range of threat actors. With an intuitive UI, threat actors can perform command and control attacks such as command line execution, file transfers, keylogging, etc., without sophistication. Researchers have also created and shared tools to generate new randomized Cobalt Strike profiles easily. These profiles are highly configurable, small in memory, emit low and asynchronous traffic, and can be masqueraded as different pieces of software, making them difficult to detect.

The traditional approach taken by some vendors uses static IPS signatures, which fails to address new and evasive variants. Some customers even try to monitor their infrastructure manually to identify irregular network activity. A new approach is needed to effectively block C2 traffic with Cobalt Strike while still avoiding any false positives.

Prisma Access Blocks 99.2% of Cobalt Strike Command-and-Control Profile Categories

Palo Alto Networks’ Advanced Threat Prevention uses ML-based cloud-delivered security not only to help protect against standard C2 network activity from Cobalt Strike but also to evaluate the relative resiliency of the protection provided by each product when modifications are made to evade detection.

With the cloud-delivered security of Prisma Access, a customer can view the logs of an attempted command and control attack, which can be automatically blocked through configurable settings, while our competitors may allow the traffic.

SecureIQ Lab tested the ability of cloud-delivered security solutions to block the command-and-control capabilities of the Cobalt Strike attack suite. The test measured the block rate of each vendor in five attack scenarios: basic attack, random attack, custom attack, nonstandard ports-based attack, HTTPS attack, and hostname change attack.

To summarize, Palo Alto Networks leads other security vendors in preventing Cobalt Strike C2 communication. When analyzing other competitors, Cisco failed all HTTPS-based attack scenarios as their solution cannot decrypt IPS traffic in the current version of their SSE solution, and Zscaler missed several attack scenarios when non-standard ports for hosting the Cobalt Strike profile were used. The full report can be found here. For a similar test on next-generation firewalls, please click here.

Conclusion

Continuous security inspection is a fundamental component of a Zero Trust framework and an essential component of ZTNA 2.0. Simplifying identity security across hybrid identity stores enables a unified security product to deliver Zero Trust outcomes with Zero Exceptions. Learn more about how Prisma Access transforms security and networking to deliver the infrastructure and support that today’s hybrid enterprises need here and get started exploring how ZTNA 2.0 on Prisma Access can help secure today’s hybrid enterprises and workforces.

About Sponsored Blog Posts

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

RSS Day Two Cloud

  • Day Two Cloud 206: Making The Most Of Red Teaming With Gemma Moore August 9, 2023

RSS Full Stack Journey

  • Full Stack Journey 080: Career Transitions Via Cloud, Infrastructure, And Content Creation With Rishab Kumar July 18, 2023

RSS Heavy Networking

  • Heavy Networking 694: A Network Engineering Roundtable August 11, 2023

RSS Heavy Strategy

  • HS053 IT Facilities in 2023 August 2, 2023

RSS Heavy Wireless

  • Heavy Wireless 008: 3D Printing For Wireless Engineers August 8, 2023

RSS IPv6 Buzz

  • IPv6 Buzz 132: Down The Rabbit Hole Of IPv6 Router Advertisements August 10, 2023

RSS Kubernetes Unpacked

  • Kubernetes Unpacked 032: AI Use Cases For Kubernetes August 11, 2023

RSS Network Break

  • Network Break 442: HashiCorp Swaps Open Source For BSL; Open Enterprise Linux Goes After RHEL August 14, 2023

RSS Tech Bytes

  • Tech Bytes: Spotting Performance Problems Faster With Digital Experience Monitoring (Sponsored) August 7, 2023

RSS YouTube

  • Kubernetes Security And Networking 8: Loading The Cillium CNI May 23, 2023

Recent Comments

  • Shay Jan on Heavy Networking 694: A Network Engineering Roundtable
  • MikeT on Heavy Networking 692: Implementing Practical Network Automation – With Tony Bourke
  • Tony Bourke on Heavy Networking 692: Implementing Practical Network Automation – With Tony Bourke
  • Steve Titzer on Heavy Networking 689: Prepping For Certification Exams With Mary Fasang
  • Adrian Villanueva on Day Two Cloud 200: Coaching For Accidental (And On-Purpose) Managers
  • John Max on HS052 Professional Liability and Qualified Design

PacketPushers Podcast

  • Heavy Networking
  • Day Two Cloud
  • Network Break
  • Briefings In Brief & Tech Bytes
  • Full Stack Journey
  • IPv6 Buzz
  • Community Podcast
  • Heavy Strategy
  • Priority Queue (Retired)
  • Datanauts (Retired)

PacketPushers Articles

  • All the News & Blogs
  • Only the Latest News
  • Only the Community Blogs
  • Virtual Toolbox

Search

Website Information

  • Frequently Asked Questions
  • Subscribe
  • Sponsorship
  • Meet The Hosts
  • Pitch Us
  • Terms & Conditions
  • Privacy Policy

Connect

  • Contact The Packet Pushers
  • Join Our Slack Group
  • Subscribe To Podcasts
  • Subscribe To Newsletter
  • Become A Sponsor
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

© Copyright 2023 Packet Pushers Interactive, LLC · All Rights Reserved