Discover what’s really driving the shift toward unified security
Discover how geopolitical tensions are fueling advanced cyber campaigns
Is the Quantum Threat Closer Than You Think?
  • Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • What's New
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Demos and Trials

Research Reports
Jan 24, 2023

2022 SecureIQLab: Command and Control Comparative Report

2022 SecureIQLab: Command and Control Comparative Report

English
Download
Download
asset thumbnail

The Palo Alto Networks Unit 42® threat research team has observed more than a 73% increase in the use of Red Team tools such as Cobalt Strike by threat actors1. These tools are purpose-built to obfuscate network payloads and emulate real-world traffic to avoid detection. It is imperative that organizations today employ security solutions to protect against these kinds of sophisticated threats.

In an effort to understand the breadth of coverage for attacks conducted by red team tools, SecureIQLab was commissioned to test the ability of next-generation firewalls to block the command-and-control capabilities of the Cobalt Strike attack suite. In this report, the Palo Alto Networks Advanced Threat Prevention subscription was compared to CheckPoint, Cisco and Fortinet solutions.

About the Report

  • SecureIQLab tested the ability of next-generation firewalls to block the command-and-control capabilities of the Cobalt Strike attack suite, which is popular among adversaries
  • Four physical and two virtual firewalls were tested: Check Point SG5100, Cisco Secure Firewall 4110, Fortinet FG-301E, Fortinet FG-VM04V, Palo Alto Networks PA-460, and Palo Alto Networks PA-VM-Flex
  • The test measured the block rate of each firewall in six attack scenarios: Basic attack, random attack, custom attack, nonstandard ports-based attack, HTTPS attack, hostname change attack
  • All scenarios except for the basic attack scenario leveraged "malleable C2 profiles" which are highly customized attack profiles. This technique allows adversaries to modify Cobalt Strike to evade signature-based detections

* https://paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/unit42-network-threat-research-report-vol1.pdf

Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language