Golang

RedGuard

RedGuard

RedGuard is a C2 front flow control tool written in Go (Golang). It helps red teams hide their C2 infrastructure by controlling traffic interactions and evading blue teams, AV, EDR and cyberspace search engines.

Key Insights

Key Insights

RedGuard is a pre-flow control for C2 infrastructures, so attackers can hide their C2 channels better. It intercepts and controls traffic between attacker and target system, blocks analysis traffic, and prevents detection by security tools. So red teams can do their job without being detected.

Features

Written in Golang, RedGuard is lightweight and efficient. Supports multiple C2 servers, domain fronting, and load balancing to hide. Can detect cloud sandboxes based on JA3 fingerprint libraries, block malicious requests to prevent replay attacks, whitelist access and prevent scanning and identification of C2 infrastructure by cyberspace mapping tools, and redirect or intercept scanning probe traffic.

Use Cases

RedGuard is useful during offensive and defensive exercises when defenders analyze C2 interaction traffic with situational awareness platforms. Prevents malware sample analysis by detecting cloud sandboxes, blocks malicious requests to perform replay attacks, and restricts access requests to specific server IPs. Prevents scanning and identification of C2 infrastructure by cyberspace mapping technology and supports front flow control for multiple C2 servers, domain fronting, and load balancing to hide.

Known Variants

Known Variants

No known variants of RedGuard. The tool is customizable so users can make it to their needs and can result to different implementations.

No known variants of RedGuard. The tool is customizable so users can make it to their needs and can result to different implementations.

Mitigation Strategies

Mitigation Strategies

  • Monitor the network for unusual traffic patterns of C2 communication.

  • Update security tools to detect and block RedGuard.

  • Do security assessments to identify and remediate vulnerabilities.

  • Educatethe security team about RedGuard capabilities and IOCs.

Targeted Industries or Sectors

Targeted Industries or Sectors

RedGuard is used by red teams and penetration testers across industries to simulate adversarial attacks and test security controls. There is no public information that specific industries or sectors have been targeted using RedGuard.

RedGuard is used by red teams and penetration testers across industries to simulate adversarial attacks and test security controls. There is no public information that specific industries or sectors have been targeted using RedGuard.

Associated Threat Actors

Associated Threat Actors

No known threat actors associated with RedGuard. Being open source, anyone can use it, from security professionals to malicious actors, without attribution.

No known threat actors associated with RedGuard. Being open source, anyone can use it, from security professionals to malicious actors, without attribution.

References

    Related Posts:

    A Hunt How-To: Detecting RedGuard C2 Redirector
    Apr 2, 2024

    A Hunt How-To: Detecting RedGuard C2 Redirector

    A Hunt How-To: Detecting RedGuard C2 Redirector
    Apr 2, 2024

    A Hunt How-To: Detecting RedGuard C2 Redirector

    A Hunt How-To: Detecting RedGuard C2 Redirector
    Apr 2, 2024

    A Hunt How-To: Detecting RedGuard C2 Redirector

    Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
    Oct 10, 2024

    Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity

    Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
    Oct 10, 2024

    Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity

    Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
    Oct 10, 2024

    Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity

    EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains
    Aug 13, 2024

    EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains

    EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains
    Aug 13, 2024

    EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains

    EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains
    Aug 13, 2024

    EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains