Monday, April 28, 2025
HomeCyber Security NewsCobalt Strike Exploitation by Hackers Drops, Report Reveals

Cobalt Strike Exploitation by Hackers Drops, Report Reveals

Published on

SIEM as a Service

Follow Us on Google News

A collaborative initiative involving Microsoft’s Digital Crimes Unit (DCU), Fortra, and the Health Information Sharing and Analysis Center (Health-ISAC) has reported a major drop in the use of unauthorized versions of the cyber tool Cobalt Strike by hackers.

Since the partnership began in 2023, these organizations have worked tirelessly to combat the misuse of Cobalt Strike and compromised Microsoft software, which have been weaponized to deploy ransomware and other malware, particularly targeting critical sectors like healthcare.

Progress and Impact

Over the past two years, the number of unauthorized Cobalt Strike copies observed in the wild has plummeted by 80%, significantly limiting their availability to cyber criminals.

- Advertisement - Google News

This reduction has had a tangible impact on criminal operations, with these tools now being abused far less often.

The campaign has also successfully seized and sinkholed over 200 malicious domains, effectively cutting off their ability to accept legitimate traffic and preventing further exploitation by threat actors.

Moreover, the average dwell time—the period between initial detection and takedown—has been reduced to less than one week in the United States and less than two weeks worldwide.

Global Success with Operation MORPHEUS

In July 2024, Fortra participated in Operation MORPHEUS, a three-year investigation led by the UK’s National Crime Agency with support from law enforcement in several countries, including Australia, Canada, Germany, the Netherlands, Poland, and the United States.

Europol coordinated the international operations, collaborating with private partners like Fortra. This operation resulted in the removal of 593 flagged IP addresses associated with unauthorized Cobalt Strike use.

The campaign to combat unauthorized Cobalt Strike usage is ongoing and continuously evolving. The partners remain committed to providing critical information to law enforcement agencies worldwide to support their investigations.

Additionally, Fortra has joined the Pall Mall Process, an international initiative aimed at developing regulations to combat the unauthorized distribution and usage of commercial cyber intrusion tools.

Efforts to issue takedown notices to hosting providers continue, raising awareness about the illicit use of unauthorized Cobalt Strike copies.

These activities are closely monitored to identify root causes and prevent reoccurrences.

Compliance is passively monitored, and notices are issued persistently until illegal versions are removed from web properties.

Automation processes have been implemented to increase efficiency and simplify the takedown process.

Fortra is also continually updating Cobalt Strike’s security controls to thwart cracking attempts and protect legitimate users.

Strengthening Red Team Tool Security

The modern cybersecurity landscape underscores the need for red team solutions, but these tools carry inherent risks of misuse.

To address this, Fortra proactively shares disruption techniques through conference talks and webinars, providing a roadmap for other solution providers to engage in similar public-private partnerships.

Collaboration is crucial in advancing cybersecurity and strengthening collective defense against cybercriminals.

This partnership ensures that legitimate security tools can be used responsibly and effectively to protect organizations worldwide.

In closing, the success of this initiative is a testament to the power of persistence and partnership in securing the digital ecosystem.

Microsoft DCU, Health ISAC, and other participating organizations are commended for their contributions, and the collaboration is set to continue in the coming years to defend the integrity of critical commercial cybersecurity tools.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...