Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 193

Cobalt Strike

What is Cobalt Strike?

Cobalt StrikeA commercial adversary-simulation platform widely used for red-team operations and frequently abused by threat actors for post-exploitation and command-and-control.


Cobalt Strike is a commercial threat-emulation tool originally written by Raphael Mudge and now sold by Fortra. It provides a team server, the Beacon implant, malleable C2 profiles, and tooling for phishing, lateral movement, pivoting, and privilege escalation, allowing red teams to credibly simulate sophisticated intrusions. Cracked and leaked versions have been heavily adopted by ransomware affiliates and nation-state actors, making it one of the most observed offensive frameworks in real-world breaches. Defenders profile its Beacon traffic, jitter patterns, and named pipes through EDR, network analytics, and YARA rules. Lawful use requires a paid license and engagement authorization.

Examples

  1. 01

    A red team running a malleable C2 profile that mimics a Microsoft update server.

  2. 02

    An incident responder pivoting on a Beacon named pipe to identify infected hosts.

Frequently asked questions

What is Cobalt Strike?

A commercial adversary-simulation platform widely used for red-team operations and frequently abused by threat actors for post-exploitation and command-and-control. It belongs to the Defense & Operations category of cybersecurity.

What does Cobalt Strike mean?

A commercial adversary-simulation platform widely used for red-team operations and frequently abused by threat actors for post-exploitation and command-and-control.

How does Cobalt Strike work?

Cobalt Strike is a commercial threat-emulation tool originally written by Raphael Mudge and now sold by Fortra. It provides a team server, the Beacon implant, malleable C2 profiles, and tooling for phishing, lateral movement, pivoting, and privilege escalation, allowing red teams to credibly simulate sophisticated intrusions. Cracked and leaked versions have been heavily adopted by ransomware affiliates and nation-state actors, making it one of the most observed offensive frameworks in real-world breaches. Defenders profile its Beacon traffic, jitter patterns, and named pipes through EDR, network analytics, and YARA rules. Lawful use requires a paid license and engagement authorization.

How do you defend against Cobalt Strike?

Defences for Cobalt Strike typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Cobalt Strike?

Common alternative names include: Cobalt Strike Beacon, CS.

Related terms

See also