Identification through active fingerprinting
Global scanning of ports and SSL certificates with known Team Server characteristics. Beacon HTTP headers, JARM fingerprint, listener patterns.
Fortgale identifies and monitors daily over 800 active CobaltStrike servers worldwide. We extract configurations, watermarks and profiles — turning offensive infrastructure into defensive intelligence.
An isolated malicious IP is an alert. An IP correlated to a watermark, a campaign and a known actor is operational intelligence.
Global scanning of ports and SSL certificates with known Team Server characteristics. Beacon HTTP headers, JARM fingerprint, listener patterns.
For each Team Server: extraction of licence watermark, payload type, sleep, jitter, Malleable Profile. The watermark correlates different campaigns to the same operator.
Not just IPs/domains: a structured profile of the attacker (cluster, group, TTPs, infrastructure overlaps) integrated into SOC alerts.
Global scanning with active fingerprinting: ports, SSL certificates, JARM, Beacon HTTP headers, listener patterns.
Each Team Server is queried. Extraction of watermark, payload type, sleep time, jitter, named pipe, DNS beacon, Malleable C2 Profile.
The watermark is the operator's fingerprint: same watermark across different servers → same attacker. Infrastructure overlaps emerge.
Output: blockable IoCs, attacker profiles, context for the SOC, threat hunting on already-observed patterns. Distributed via STIX/TAXII.
{
"BeaconType": "HTTPS",
"Port": 443,
"SleepTime": 60000,
"Jitter": 20,
"MaxGetSize": 1403644,
"Watermark": 1580103824,
"C2Server": "update-cdn[.]global,/dpixel",
"HttpPostUri": "/submit.php",
"MallProfile": "amazon",
"UserAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64)",
"NamedPipe": "\\pipe\\msagent_*",
"DnsBeacon": "",
"SpawnTo": "svchost.exe"
// → Watermark correlated to campaign EU-2025-047
// → Attribution: ransomware cluster A
} CobaltStrike is not alone. BruteRatel, Havoc and Metasploit are growing among criminals and APTs.
Commercial CobaltStrike alternative. Adopted by Black Basta + APT. Native EDR bypass, AMSI bypass, direct syscall, sleep obfuscation.
Open source, growing among nation-state actors. Demon Agent, Reflective DLL, sleep obfuscation, process injection, HTTPS/SMB/DNS.
Pen-test framework. Used for post-exploitation by criminal operators. Meterpreter, reverse shell, staged payload, post-exploitation modules.
IPs, domains, certificates of active C2s distributed via STIX/TAXII to the customer's SIEM/EDR/firewall. Blockable preventively before an attack.
When an alert correlates an IP to a known C2, the SOC receives the attacker profile: group, typical target sector, TTPs, overlaps.
Already-observed beacon, sleep, jitter, named pipe patterns become hunting queries. Active hunting on customer infrastructure.
When a new C2 cluster emerges against a sector, customers in that sector receive a dedicated advisory.
Technical profiles of actors using the framework: watermark, infrastructure, MITRE-mapped TTPs, target sectors, attribution.
During IR: identifying the C2 framework and watermark accelerates attribution and containment.
34k+ IoCs per week, ~16k from C2 and malware tracking. Distributed via STIX/TAXII to SIEM/EDR.
Discover the Feed →Structured profiles of 180+ adversaries with watermark, infrastructure and observed overlaps.
Discover CTI →The SOC's detection rules are powered by tracked C2s. Triage in <15 min, containment ~11 min.
Discover MDR →Active fingerprinting: scanning ports and SSL certificates with known Team Server traits, Beacon HTTP headers, JARM, Malleable C2 Profile. Each identified server is queried to extract the full config.
The CobaltStrike Beacon contains a unique watermark associated with the purchased licence. Correlating identical watermarks across different servers and campaigns → attribution to the same operator. Infrastructure overlaps across groups become observable.
Designed to bypass modern EDRs (Defender, CrowdStrike, SentinelOne). Direct syscall, AMSI bypass, sleep obfuscation. Adopted by Black Basta and advanced ransomware groups.
BruteRatel C4, Havoc (open source, nation-state), Metasploit (criminal post-exploitation), Sliver, Nighthawk, Deimos, emerging custom implants.
Three modes: direct IoCs (IPs/domains blockable preventively), context inside SOC alerts (attacker info), proactive threat hunting (already-observed beacon/config patterns).
Fortgale identifies it before it is used in an attack. Configurations, watermark, attacker profile — all available as operational intelligence for your security team.
No nurturing sequences, no auto-replies. One of our analysts calls you back within one business day.
The full Report (executive summary · operational IoCs · technical runbook) is restricted. Share two details and one of our analysts contacts you with access and a short technical briefing.
Response in 30 minutes, containment in 1–4 hours. Even if you are not a Fortgale customer.