WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – LockBit Ransomware Exploits Windows Defender to Deliver Cobalt Strike
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – LockBit Ransomware Exploits Windows Defender to Deliver Cobalt Strike

Author: Alec Davison

Created: Tuesday, August 2, 2022 - 19:23

Categories: Cybersecurity

LockBit 3.0 ransomware threat actors are exploiting the Windows Defender command line tool to drop Cobalt Strike beacons on compromised systems and evade detection by security software, according to security researchers at Sentinel Labs.

Cobalt Strike is a legitimate penetration testing tool with multiple features that allow threat actors to conduct network reconnaissance and lateral movement before deploying ransomware or other malware. In a recent incident response for a LockBit ransomware attack, researchers detected the abuse of Microsoft Defender’s command line tool “MpCmdRun.exe” to side-load malicious Dynamic-link libraries (DLLs) that decrypt and install Cobalt Strike beacons. According to Sentinel Labs researchers, “Defenders need to be alert to the fact that LockBit ransomware operators and affiliates are exploring and exploiting novel ‘living off the land’ tools to aid them in loading Cobalt Strike beacons and evading some common EDR and traditional AV detection tools.” The initial compromise occurred via the Log4j vulnerability against an unpatched VMWare Horizon Server. Therefore, to defend against this activity, members are encouraged to ensure all their systems are fully patched. Read more at BleepingComputer or access the full report at Sentinel Labs.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar