{"id":239934,"date":"2024-07-05T05:32:15","date_gmt":"2024-07-05T05:32:15","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/07\/05\/europol-shuts-down-almost-600-ip-addresses-in-cobalt-strike-cybercrime-crackdown\/"},"modified":"2025-06-25T17:15:27","modified_gmt":"2025-06-25T17:15:27","slug":"europol-shuts-down-almost-600-ip-addresses-in-cobalt-strike-cybercrime-crackdown","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/07\/05\/europol-shuts-down-almost-600-ip-addresses-in-cobalt-strike-cybercrime-crackdown\/","title":{"rendered":"Europol shuts down almost 600 IP addresses in Cobalt Strike cybercrime crackdown"},"content":{"rendered":"<p> [ad_1]<br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/readwrite.com\/wp-content\/uploads\/2024\/07\/Europol-shuts-down-almost-600-addresses-in-Cobalt-Strike-cybercrime-crackdown-900x600.png\" \/><\/p>\n<div>\n<p>Nearly 600 IP addresses have been dismantled by <a href=\"https:\/\/readwrite.com\/amd-suffers-huge-alleged-data-hack\/\">Europol<\/a> as part of a concerted effort to tackle cybercrime involving the <a href=\"https:\/\/readwrite.com\/hackers-actively-targeting-severe-authentication-bypass-flaw-in-connectwise-software\/\">misuse of the Cobalt Strike security tool<\/a>. The operation, dubbed Operation MORPHEUS, took place between June 24 and June 28, targeting older, unlicensed versions of the tool commonly used in criminal activities.<\/p>\n<p>\u201cThroughout the week, law enforcement flagged known IP addresses associated with criminal activity, along with a range of domain names used by criminal groups, for online service providers to disable unlicensed versions of the tool. A total of 690 IP addresses were flagged to online service providers in 27 countries. By the end of the week, 593 of these addresses had been taken down,\u201d Europol said in a <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/europol-coordinates-global-action-against-criminal-abuse-of-cobalt-strike\" target=\"_blank\" rel=\"noopener\">statement<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\u26a0\ufe0fLaw enforcement teamed up with the private sector to stop criminals abusing Cobalt Strike to carry out attacks.<\/p>\n<p>An action led by <a href=\"https:\/\/twitter.com\/NCA_UK?ref_src=twsrc%5Etfw\">@NCA_UK<\/a> &amp; coordinated from Europol HQ resulted in the takedown of 593 IP addresses linked to criminal activity.<\/p>\n<p>Details \u2935\ufe0f<a href=\"https:\/\/t.co\/yrqiri7G4m\">https:\/\/t.co\/yrqiri7G4m<\/a> <a href=\"https:\/\/t.co\/jJzrgOPh9t\">pic.twitter.com\/jJzrgOPh9t<\/a><\/p>\n<p>\u2014 Europol (@Europol) <a href=\"https:\/\/twitter.com\/Europol\/status\/1808513790335480230?ref_src=twsrc%5Etfw\">July 3, 2024<\/a><\/p>\n<\/blockquote>\n<p>Operation MORPHEUS was mainly led by the UK\u2019s National Crime Agency (NCA) and involved major contributions from authorities across Australia, Canada, Germany, the Netherlands, Poland, and the United States. Europol\u2019s European Cybercrime Centre (EC3) also played a role in coordinating international efforts and liaising with private sector partners.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The NCA has coordinated global action against illicit software which has been used by cybercriminals for over a decade to infiltrate victims\u2019 IT systems and conduct attacks.<\/p>\n<p>FULL STORY \u27a1\ufe0f <a href=\"https:\/\/t.co\/FrbB3glUOk\">https:\/\/t.co\/FrbB3glUOk<\/a> <a href=\"https:\/\/t.co\/nV6cciRj9g\">pic.twitter.com\/nV6cciRj9g<\/a><\/p>\n<p>\u2014 National Crime Agency (NCA) (@NCA_UK) <a href=\"https:\/\/twitter.com\/NCA_UK\/status\/1808530890663792952?ref_src=twsrc%5Etfw\">July 3, 2024<\/a><\/p>\n<\/blockquote>\n<p>Paul Foster, the NCA\u2019s threat leadership director, <a href=\"https:\/\/www.nationalcrimeagency.gov.uk\/news\/national-crime-agency-leads-international-operation-to-degrade-illegal-versions-of-cobalt-strike\" target=\"_blank\" rel=\"noopener\">said<\/a> that although Cobalt Strike is a legitimate piece of software, cybercriminals have been exploiting its use for \u201cnefarious purposes\u201d.<\/p>\n<p>He added: \u201cIllegal versions of it have helped lower the barrier of entry into cybercrime, making it easier for online criminals to unleash damaging ransomware and malware attacks with little or no technical expertise. Such attacks can cost companies millions in terms of losses and recovery.<\/p>\n<p>\u201cI would urge any businesses that may have been a victim of cyber crime to come forward and report such incidents to law enforcement.\u201d<\/p>\n<h2>What is a Cobalt Strike attack?<\/h2>\n<p>Cobalt Strike, developed by <a href=\"https:\/\/readwrite.com\/81-percent-of-security-pros-say-phishing-is-the-top-threat\/\">Fortra<\/a>, is a legitimate and widely used cybersecurity tool designed to help IT security professionals in performing attack simulations to uncover vulnerabilities. However, it can be exploited maliciously when in the hands of cybercriminals. Reports suggest that cracked copies of older versions like Ryuk, Trickbot, and Conti have been used in several high-profile malware and ransomware cases.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">We\u2019ve partnered with Europol, the UK National Crime Agency, and several other private partners to protect the legitimate use of Cobalt Strike. <a href=\"https:\/\/t.co\/8IQWr10YBY\">https:\/\/t.co\/8IQWr10YBY<\/a> <a href=\"https:\/\/t.co\/gALYztQmdI\">https:\/\/t.co\/gALYztQmdI<\/a><\/p>\n<p>\u2014 Fortra (@fortraofficial) <a href=\"https:\/\/twitter.com\/fortraofficial\/status\/1808522000798789671?ref_src=twsrc%5Etfw\">July 3, 2024<\/a><\/p>\n<\/blockquote>\n<p>To counteract this threat, Fortra has collaborated with law enforcement to safeguard the legitimate usage of its software. \u201cFortra has taken significant steps to prevent the abuse of its software and has partnered with law enforcement throughout this investigation to protect the legitimate use of its tools,\u201d Europol stated.<\/p>\n<p>The operation was said to be successful due to the cooperation of private industry partners such as BAE Systems Digital Intelligence, Trellix, Spamhaus, abuse.ch, and The Shadowserver Foundation. The partners provided scanning, telemetry, and analytical tools to identify and curb the malicious use of Cobalt Strike.<\/p>\n<p>Europol\u2019s EC3 has supported this project since it was launched in September 2021, providing analytical and forensic assistance. The Malware Information Sharing Platform was also used extensively, with over 730 threat intelligence pieces shared, containing almost 1.2 million indicators of compromise.<\/p>\n<p>This coordinated crackdown is part of a broader strategy enabled by Europol\u2019s amended Regulation, which strengthens its ability to support EU Member States by fostering cooperation with the private sector. This strategic approach has significantly enhanced the resilience of Europe\u2019s digital ecosystem against cyber threats.<\/p>\n<p><em>Featured image: Ideogram<\/em><\/p>\n<\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/readwrite.com\/europol-shuts-600-ip-addresses-cobalt-strike-cybercrime-crackdown\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Nearly 600 IP addresses have been dismantled by Europol as part of a concerted effort to tackle cybercrime involving the misuse of the Cobalt<\/p>\n","protected":false},"author":1,"featured_media":239935,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[152],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/239934"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=239934"}],"version-history":[{"count":0,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/239934\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/239935"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=239934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=239934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=239934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}