Metasploit is a legitimate penetration testing framework widely used by security professionals to identify and validate vulnerabilities. However, threat actors frequently weaponize its exploit modules and payloads to conduct attacks. Once a system is compromised, Metasploit enables attackers to deploy in-memory payloads such as Meterpreter, establish reverse shells, escalate privileges, harvest credentials, move laterally, and deploy additional malware. Because it is modular and customizable, adversaries often modify payload signatures to evade traditional antivirus detection.
Symptoms
You might observe the following to be associated with this threat:
- Unexpected reverse TCP/HTTP/HTTPS outbound connections to unfamiliar IP addresses or uncommon ports
- Encoded or obfuscated PowerShell command execution
- Creation of new scheduled tasks, services, cron jobs, or registry run keys
- Disabled endpoint protection or tampering with logging services
Technical Breakdown
Metasploit is leveraged after identifying and exploiting vulnerable services such as unpatched web servers, exposed RDP instances, outdated VPN appliances, or misconfigured cloud workloads. Once initial access is obtained, attackers deploy a staged or stageless payload. Typically, this is Meterpreter because it establishes a command and control (C2) session back to the attacker’s infrastructure. Meterpreter primarily operates in memory, reducing on-disk artifacts and complicating detection efforts. It supports functionality including process migration, keystroke logging, file exfiltration, webcam capture, and credential harvesting.
Attackers may also leverage Metasploit’s post-exploitation modules to automate privilege escalation, pivot through internal networks, and deploy ransomware or data exfiltration tools. In cloud environments, compromised credentials obtained through Metasploit sessions can be used to enumerate storage buckets, extract secrets, or create persistent IAM roles. Because Metasploit modules often target publicly disclosed CVEs, exploitation attempts frequently align with recently announced vulnerabilities.
The primary functions of BlackSuit once executed include:
-
Initial exploitation of vulnerable services to gain access
- Payload deployment (e.g., Meterpreter) for remote control
- Privilege escalation & credential harvesting
- Lateral movement & post-exploitation activity
Next Steps
Iru Endpoint Detection & Response (EDR) automatically removes detected threats when file monitoring is set to Protect. While the malicious file is removed, it can leave behind artifacts that need to be cleaned manually.
Avoid clicking links in emails from unidentified senders, and use strong passwords or passphrases, or a password manager, to prevent credential theft.
Nova Stealer
Nova Stealer is a macOS information stealer that targets users by impersonating trusted applications to steal cryptocurrency credentials and sensitive data.
Learn MoreAtomic Stealer (AMOS)
Atomic Stealer (AMOS) is a sophisticated piece of malware that targets Apple users by masquerading as legitimate applications. Once installed, AMOS can exfiltrate extensive data, including keychain passwords, user documents, system information, browser data, credit card information, and cryptocurrency wallets. There is a strong association between Atomic Stealer and Russian-speaking cybercriminal communities.
Learn MoreCthulhu
Cthulhu is a macOS stealer that masquerades as legitimate software to deceive users into installing it. Once executed, it collects sensitive information, including system data, browser credentials, cryptocurrency wallets, and game account details. Cthulhu has also been known to target enterprise environments to conduct cyber espionage campaigns.
Learn More