Open Source
C2
Python
Octopus is an open-source, Python-based C2 server designed to manage a PowerShell agent over HTTP/S. It’s intended for pre-engagement use, letting attackers gather intelligence before beginning a full red team operation.
Octopus is a C2 server, it’s used to communicate with the attacker and the compromised systems. It uses PowerShell agents to execute commands, exfiltrate data, and deploy additional payloads. It’s modular so the attacker can customize the functionality according to his needs.
Distribution
Attackers distribute Octopus through phishing campaigns, using malicious attachments or links to trick the victim. Once the victim interacts with the malicious content the PowerShell agent will connect to the Octopus C2 server and the attacker will have control over the infected system.
Evolution and Adaptations
Octopus has evolved over time to include various modules for different operations, like credential harvesting, lateral movement and data exfiltration. This makes it a versatile tool for attackers targeting different industries and goals.
Monitor endpoints for PowerShell activity.
Segment networks.
Use MFA.
Train users to recognize phishing.