Europol shuts down almost 600 Cobalt Strike servers in Operation Morpheus

Europol successfully conducted Operation Morpheus

Operation Morpheus by Europol and partners

Carried out by Europol,[1] Operation Morpheus[2] has concluded in successfully shutting down 593 Cobalt Strike servers used by cybercriminals to compromise victim networks. This operation, meticulously executed over a week in late June, marked the conclusion of a thorough three-year investigation initiated in 2021.

The primary goal of Operation Morpheus was to identify and eliminate unauthorized copies of the Cobalt Strike tool, which had become a popular choice for cybercriminals to execute ransomware and data theft attacks.[3]

Cobalt Strike was initially created by Fortra (formerly Help Systems) as a genuine tool for security experts to conduct penetration tests. Unfortunately, cybercriminals managed to get their hands on pirated copies of the program and started exploiting it to infiltrate networks, extract valuable information, and introduce harmful malware

Law enforcement agencies from various countries, including Australia, Canada, Germany, the Netherlands, Poland, and the United States, joined forces under the leadership of the United Kingdom's National Crime Agency (NCA)[4] to address the widespread use of Cobalt Strike in cybercriminal activities. This international collaboration was essential for the operation's success.

Private partners played an important role in Operation Morpheus

The week-long operation in late June was a coordinated effort to disrupt the infrastructure supporting unlicensed Cobalt Strike servers. Law enforcement agencies identified and flagged known IP addresses and domain names associated with criminal activities. These details were then shared with online service providers, who were tasked with disabling the illegal instances of Cobalt Strike.

A total of 690 IP addresses in 27 countries were identified, with 593 of these being successfully taken down by the end of the week. This massive effort involved the combined forces of multiple international law enforcement agencies and private sector partners, including BAE Systems Digital Intelligence, Trellix, Spamhaus, abuse.ch, and The Shadowserver Foundation. These private entities contributed by providing advanced scanning, telemetry, and analytical support, which were vital in identifying the malicious servers.

Europol's European Cybercrime Centre (EC3) was instrumental in the success of this operation by organizing more than 40 coordination meetings between law enforcement agencies and private partners, guaranteeing effective communication and cooperation.

Throughout the enforcement week, Europol established a virtual command center to supervise global law enforcement activities, enabling real-time information sharing and swift decision-making, both essential for the operation's triumph.

The Malware Information Sharing Platform utilized by Europol facilitated the exchange of threat intelligence, with over 730 pieces of information shared during the investigation. This platform allowed law enforcement and private sector partners to provide evidence and threat intelligence, bolstering disruption efforts and ensuring a comprehensive approach to combatting the cybercriminal use of Cobalt Strike.

A three-year-old operation

The takedown of these servers is a significant milestone in the fight against cybercrime. Cobalt Strike had been misused by cybercriminals for activities for years. By providing persistent remote access to compromised networks, Cobalt Strike allowed attackers to deploy additional malicious payloads and steal sensitive data.

The operation marks the conclusion of a three-year inquiry that commenced in 2021. During the investigation, more than 730 threat intelligence items were exchanged, encompassing almost 1.2 million compromise indicators. This collaborative initiative has not only thwarted continuous cybercriminal operations but also conveyed a stern warning to cybercriminals and state-sponsored actors regarding the consequences of engaging in malicious cyber activities.

Challenges remain: some regions were left out

Despite the achievements of Operation Morpheus, there are still obstacles to overcome. Cybercriminals are constantly evolving and discovering new methods to exploit tools like Cobalt Strike. Fortra, the company behind Cobalt Strike, has implemented measures to prevent misuse by screening users for legitimate purposes. However, unauthorized versions of the tool are still circulating, especially in hard-to-reach areas like China.

It is crucial for law enforcement and private sector collaboration to continue in order to stay ahead of these threats. Future initiatives should concentrate on improving detection capabilities and implementing stricter regulations on powerful cybersecurity tools to prevent their misuse. This operation has underscored the significance of international cooperation and the necessity for sustained vigilance in combating cybercrime.

About the author
Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

Ugnius Kiguolis is a professional malware analyst who is also the founder and the owner of 2-Spyware. At the moment, he takes over as Editor-in-chief.

Contact Ugnius Kiguolis
About the company Esolutions

References
Files
Software
Compare