Hackers Using Pyramid Pentesting Tool For Stealthy C2 Communications

Hackers have been leveraging the open-source Pyramid pentesting tool to establish stealthy command-and-control (C2) communications. Pyramid, first released on GitHub in 2023, is a Python-based post-exploitation framework designed to evade endpoint detection and response (EDR) tools. Its lightweight HTTP/S server capabilities make it an attractive choice for malicious actors seeking to minimize detection. Pyramid is […] The post Hackers Using Pyramid Pentesting Tool For Stealthy C2 Communications appeared first on Cyber Security News.

Feb 13, 2025 - 08:50
 0
Hackers Using Pyramid Pentesting Tool For Stealthy C2 Communications

Hackers have been leveraging the open-source Pyramid pentesting tool to establish stealthy command-and-control (C2) communications.

Pyramid, first released on GitHub in 2023, is a Python-based post-exploitation framework designed to evade endpoint detection and response (EDR) tools.

Its lightweight HTTP/S server capabilities make it an attractive choice for malicious actors seeking to minimize detection.

Pyramid is built on Python’s legitimate presence in many environments, utilizing a Python-based HTTP/S server to deliver files and act as a C2 server for offensive operations.

The framework includes modules that load well-known tools like BloodHound, secretsdump, and LaZagne directly into memory.

Security analysts at Hunt.io identified that this in-memory execution allows operators to act within the context of a signed Python interpreter, potentially bypassing traditional endpoint security measures.

Pyramid README Screenshot (Source – Hunt.io)

Detection Opportunities

Identifying Pyramid servers involves analyzing specific network signatures. When interacting with a suspected Pyramid server, the response headers exhibit distinct characteristics:

Server: BaseHTTP/0.6 Python/3.10.4
Date:
WWW-Authenticate: Basic realm="Demo Realm"
Content-Type: application/json

The server also returns a JSON response body:-

{
  "success": false,
  "error": "No auth header received"
}
Pyramid C2 HTTP 401 Response (Source – Hunt.io)

Recent scans have identified several IP addresses associated with Pyramid servers, including 104.238.61[.]144, 92.118.112[.]208, and 45.82.85[.]50.

These servers were linked to domains resembling DevaGroup, an internet marketing service, though no malicious samples have been found yet.

Pyramid C2 Servers Tracked (Source – Hunt.io)

Technical Details for Detection:-

  • HTTP Status Code: 401 Unauthorized
  • Response Body Hash (SHA-256): 54477efe7ddfa471efdcc83f2e1ffb5687ac9dca2bc8a2b86b2 53cdbb5cb9c84
  • Server Header: BaseHTTP/0.* Python/3.*
  • Authentication and Content Headers: WWW-Authenticate: Basic realm=”Demo Realm” and Content-Type: application/json

These parameters can be used to craft structured queries for identifying Pyramid-related infrastructure, enhancing cybersecurity defenses.

By focusing on authentication challenges, response headers, and specific error messages, defenders can improve detection fidelity and minimize false positives.

As open-source offensive security tools continue to advance, tracking similar implementations will provide early warnings of new infrastructure and refine detection methodologies.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

The post Hackers Using Pyramid Pentesting Tool For Stealthy C2 Communications appeared first on Cyber Security News.