Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide
  • Home
  • /
  • Security
  • /
  • NCA leads op to degrade illegal versions of Cobalt Strike

Security

NCA leads op to degrade illegal versions of Cobalt Strike

The National Crime Agency (NCA) has coordinated international action against illicit software which has been used by cybercriminals for over a decade to infiltrate victims’ IT systems and conduct attacks.

Image courtesy NCA

Unlicensed versions of Cobalt Strike, a penetration testing tool used to check for vulnerabilities in a company’s network and help improve cyber security, were targeted during a week of action last week.

Since the mid 2010s, pirated and unlicensed versions of the software downloaded by criminals from illegal marketplaces and the dark web have gained a reputation as the ‘go-to’ network intrusion tool for those seeking to build a cyber attack, allowing them to deploy ransomware at speed and at scale.

Advertisement
ADS S&P RT

Due to the range of tools, free training guides and videos that come with legal versions of the software, those adopting it for criminal use require low levels of sophistication and money.

This disruption activity represents more than two-and-a-half years of NCA-led international law enforcement and private industry collaboration to identify, monitor and denigrate its use.

Action was taken against 690 individual instances of malicious Cobalt Strike software located at 129 internet service providers in 27 countries. By the end of the week, 593 of these addresses had been taken down.

This was achieved through the NCA and law enforcement partners taking down servers and amplified by ‘abuse notifications’ from law enforcement and private industry partners, highlighting to service providers that they may be hosting malware.

Illicit versions of Cobalt Strike have been identified as being used in some of the biggest cyber incidents in recent times. Its use has also been identified in multiple malware and ransomware investigations including those into RYUK, Trickbot and Conti attacks.

The operation was jointly conducted with Europol, who assisted with international coordination, the FBI, Australian Federal Police, Royal Canadian Mounted Police, German Federal Criminal Police Office (Bundeskriminalamt), Netherlands National Police (Politie) and the Polish Central Cybercrime Bureau.

A number of private industry partners, including BAE Systems Digital Intelligence, Trellix, Shadowserver, Spamhaus and Abuse CH also supported law enforcement in identifying malicious instances and use of Cobalt Strike by cybercriminals.

Using a platform known as the Malware Information Sharing Platform, private sector organisations shared real time threat intelligence with law enforcement. More than 730 pieces of threat intelligence containing almost 1.2 million indicators of compromise were shared.

Advertisement
ODU RT

Cyber criminals deploy unlicensed versions of Cobalt Strike via spear phishing or spam emails, which attempt to get a target to click on links or open malicious attachments. When a victim opens the link or document, a Cobalt Strike ‘Beacon’ is installed giving the threat actor remote access, enabling them to profile the infected host, download malware or ransomware and steal data to then extort the victim.

Paul Foster, Director of Threat Leadership at the National Crime Agency, said: “Although Cobalt Strike is a legitimate piece of software, sadly cybercriminals have exploited its use for nefarious purposes.

“Illegal versions of it have helped lower the barrier of entry into cybercrime, making it easier for online criminals to unleash damaging ransomware and malware attacks with little or no technical expertise.

“Such attacks can cost companies millions in terms of losses and recovery.

“International disruptions like these are the most effective way to degrade the most harmful cyber criminals, by removing the tools and services which underpin their operations.

“I would urge any businesses that may have been a victim of cyber crime to come forward and report such incidents to law enforcement.”

Cobalt Strike owners Fortra will continue to work with law enforcement to identify and remove older and malicious versions of the programme from the internet.

Advertisement
PTC PTC
CCL boosts Incident Response capability with SentinelOne partnership

Security

CCL boosts Incident Response capability with SentinelOne partnership

7 February 2025

As part of its continued investment into its Incident Response services, digital forensics and cyber specialist CCL has announced a partnership with the global leader in autonomous cyber security and EDR, SentinelOne.

Goldilock expands West Midlands hub

Defence Security

Goldilock expands West Midlands hub

6 February 2025

Cyber scaleup Goldilock - the network segmentation and isolation specialist backed by NATO - has today announced the expansion of its West Midlands headquarters to support its rapid growth trajectory.

Windward launches Critical Maritime Infrastructure Protection

Defence Security

Windward launches Critical Maritime Infrastructure Protection

6 February 2025

Windward today announced the launch of its Critical Maritime Infrastructure Protection solution, a first-of-its-kind AI-powered solution designed to protect the world's essential maritime infrastructure including cables, pipelines and rigs against growing threats.

Blighter unveils AI-assisted BlighterNexus

Defence Security

Blighter unveils AI-assisted BlighterNexus

6 February 2025

Blighter has unveiled BlighterNexus, an AI-assisted connectivity and processing hub.

Advertisement
ADS S&P RT
Teledyne FLIR launches Prism Supervisor

Aerospace Defence Security

Teledyne FLIR launches Prism Supervisor

5 February 2025

Teledyne FLIR OEM, part of Teledyne Technologies Inc., today announced the release of Prism Supervisor - the latest addition to its Prism embedded software ecosystem - which integrates drone autopilot flight control systems with real-time AI-based observations, enhancing the capabilities of unmanned aircraft systems (UAS).

Cyber agencies unveil new guidelines to secure edge devices

Security

Cyber agencies unveil new guidelines to secure edge devices

5 February 2025

Cyber security chiefs in the UK and their international allies have issued a new set of guidelines to help manufacturers of edge devices make their products more secure and easier to investigate if a compromise occurs.

Advertisement
ODU RT