Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Attackers Increasingly Abuse Open Source Security Tools

Instead of developing their own hacking tools or buying them from third parties, threat groups have increasingly turned their attention to open source security tools, Kaspersky Lab reported on Wednesday.

Instead of developing their own hacking tools or buying them from third parties, threat groups have increasingly turned their attention to open source security tools, Kaspersky Lab reported on Wednesday.

One such tool is the Browser Exploitation Framework (BeEF), a penetration testing suite that focuses on the web browser. It allows pentesters to determine if the targeted environment is vulnerable by hooking the browser and using it to launch attacks.

BeEF enables attackers to monitor and profile the visitors of a website as it can deploy evercookies for persistent tracking, it can enumerate browsers and plugins, and obtain a list of domains visited by the victim. In addition to tracking, it can also be used to find and exploit vulnerabilities.

BeEF was recently spotted on the website of a university in Iran, where it had been used to track the site’s visitors. Kaspersky researchers also discovered that the tool has been leveraged by an APT actor they call NewsBeef.

NewsBeef, aka Newscaster and Charming Kitten, is an Iranian threat actor known for creating fake personas on social networking websites in an effort to harvest information from targeted individuals in the US, Israel, the UK, Saudi Arabia and Iraq.

According to Kaspersky, the group has been leveraging BeEF to track the visitors of websites they compromised via flaws in content management systems.

“They continue to be highly active, but this time, they are using a slightly more technical toolset. On one hand, they have developed skills or discovered tools to compromise select web applications and sites, supporting their watering hole campaigns,” Kaspersky researchers said in a blog post. “On the other hand, they have repackaged leaked bot source code and repackaged open source Metasploit and PowerSploit components to produce and administer backdoors and downloaders.”

While there have been some reports of BeEF being used for exploiting vulnerabilities and delivering backdoors via Metasploit integration, in most cases Kaspersky says the tool has helped attackers track users or steal their browser history.

The security firm has spotted BeEF on various websites around the world, including a Middle Eastern embassy in Russia, an Indian military technology school, a Ukrainian ICS scanner, an EU education agency, news organizations in Turkey and Kazakhstan, music-related websites in Brazil and Germany, a British lifestyle blog, a Japanese textile manufacturer, and gaming-related sites in Romania, Russia and China.

In addition to NewsBeef, APT actors such as Crouching Yeti and TeamSpy have also been observed using open source tools in their operations.

“Previously we’ve seen cyberespionage groups using different open-sourced, legitimate pentesting tools, either in combination with their own malware or without it,” said Kurt Baumgartner, principal security researcher at Kaspersky Lab. “What is different now is that we’re seeing more and more groups using BeEF as an attractive and effective alternative. This fact should be taken into account by corporate security departments in order to protect the organization from this new threat vector.”

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


More than 3,800 servers around the world have been compromised in recent ESXiArgs ransomware attacks, which also include an improved process.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.