Connect with us

Hi, what are you looking for?


Malware & Threats

“Cobalt” Hackers Use Google App Engine in Recent Attacks

Infamous “Cobalt” hacking group has been using Google App Engine for the delivery of malware through PDF decoy documents, Netskope’s security researchers say. 

Infamous “Cobalt” hacking group has been using Google App Engine for the delivery of malware through PDF decoy documents, Netskope’s security researchers say. 

Operating since at least 2016, the Russia-based threat actor is known for attacks against financial institutions, including the theft of $9.7 million from the Russian MetakkinvestBank. In August last year, the group was targeting Russian and Romanian banks

In recent assaults, the hackers abused URL redirection in PDF decoy documents to point victims to a malicious payload. HTTPS URLs point to Google App Engine, in an attempt to trick the victim into believing they are accessing a legitimate file from a trusted source like Google.

Delivered as attachments to emails and created using Adobe Acrobat 18.0, the PDF files contained the malicious URL in a compressed form in the PDF stream using Flat Decode. 

The URL redirection abused in these incidents falls under the category of Unvalidated Redirects and Forwards as per the Open Web Application Security Project (OWASP), Netskope’s researchers point out in a report shared with SecurityWeek

“Once the URL is accessed, the user is logged out from and a response status code ‘302’ is generated for URL redirection. As this action gets executed, the user is in turn redirected to using the query “?continue=”.  Using this redirection logic, the destination landing page is reached,” the researchers explain. 

PDF readers would normally display a security warning when the document connects to a website but, since the prompt in this case mentions, the intended victim is likely to allow it to reach the website. 

Furthermore, a “default allow” action in popular PDF readers could also allow the attackers to deploy attacks without triggering the security alert. If is whitelisted by administrators for legitimate reasons, the attack is once again likely to go through unnoticed. 

Advertisement. Scroll to continue reading.

The PDFs used in this attack downloaded a Microsoft Word document with obfuscated macro code, which prompted the victim to enable editing content. Once that happens, the macro is executed and another stage payload is downloaded. 

In this case, a .txt file is downloaded and then detonated using Microsoft Connection Manager Profile Installer (csmtp.exe). The method resembles the Squiblydoo technique, where malicious scriptlets are loaded using native Windows applications to bypass application whitelisting solutions. 

Although the .txt file did not serve a payload, the security researchers were able to link the attack to the infamous Cobalt hacking group, which is known for the use of the high-profile Carbanak malware and of the Cobalt Strike implant. 

The recent attacks targeted more than 20 other banking, government and financial institutions globally, the security researchers say. 

“Though the mastermind of the group was arrested on March 26th, 2018 by Europol, there are still some targeted attacks executed by the group. Based on the timeline of the emails sent to the potential targets we expect the group to be actively carrying out attacks,” Netskope says. 

Related: New Cobalt Campaign Targets Russian and Romanian Banks

Related: Cobalt Hackers Now Targeting Banks Directly

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


The recent ransomware attack targeting Rackspace was conducted by a cybercrime group named Play using a new exploitation method, the cloud company revealed this...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.