Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide
  • Home
  • /
  • Security
  • /
  • NCA leads op to degrade illegal versions of Cobalt Strike

Security

NCA leads op to degrade illegal versions of Cobalt Strike

The National Crime Agency (NCA) has coordinated international action against illicit software which has been used by cybercriminals for over a decade to infiltrate victims’ IT systems and conduct attacks.

Image courtesy NCA

Unlicensed versions of Cobalt Strike, a penetration testing tool used to check for vulnerabilities in a company’s network and help improve cyber security, were targeted during a week of action last week.

Since the mid 2010s, pirated and unlicensed versions of the software downloaded by criminals from illegal marketplaces and the dark web have gained a reputation as the ‘go-to’ network intrusion tool for those seeking to build a cyber attack, allowing them to deploy ransomware at speed and at scale.

Advertisement
ODU RT

Due to the range of tools, free training guides and videos that come with legal versions of the software, those adopting it for criminal use require low levels of sophistication and money.

This disruption activity represents more than two-and-a-half years of NCA-led international law enforcement and private industry collaboration to identify, monitor and denigrate its use.

Action was taken against 690 individual instances of malicious Cobalt Strike software located at 129 internet service providers in 27 countries. By the end of the week, 593 of these addresses had been taken down.

This was achieved through the NCA and law enforcement partners taking down servers and amplified by ‘abuse notifications’ from law enforcement and private industry partners, highlighting to service providers that they may be hosting malware.

Illicit versions of Cobalt Strike have been identified as being used in some of the biggest cyber incidents in recent times. Its use has also been identified in multiple malware and ransomware investigations including those into RYUK, Trickbot and Conti attacks.

The operation was jointly conducted with Europol, who assisted with international coordination, the FBI, Australian Federal Police, Royal Canadian Mounted Police, German Federal Criminal Police Office (Bundeskriminalamt), Netherlands National Police (Politie) and the Polish Central Cybercrime Bureau.

A number of private industry partners, including BAE Systems Digital Intelligence, Trellix, Shadowserver, Spamhaus and Abuse CH also supported law enforcement in identifying malicious instances and use of Cobalt Strike by cybercriminals.

Using a platform known as the Malware Information Sharing Platform, private sector organisations shared real time threat intelligence with law enforcement. More than 730 pieces of threat intelligence containing almost 1.2 million indicators of compromise were shared.

Advertisement
PTC rectangle

Cyber criminals deploy unlicensed versions of Cobalt Strike via spear phishing or spam emails, which attempt to get a target to click on links or open malicious attachments. When a victim opens the link or document, a Cobalt Strike ‘Beacon’ is installed giving the threat actor remote access, enabling them to profile the infected host, download malware or ransomware and steal data to then extort the victim.

Paul Foster, Director of Threat Leadership at the National Crime Agency, said: “Although Cobalt Strike is a legitimate piece of software, sadly cybercriminals have exploited its use for nefarious purposes.

“Illegal versions of it have helped lower the barrier of entry into cybercrime, making it easier for online criminals to unleash damaging ransomware and malware attacks with little or no technical expertise.

“Such attacks can cost companies millions in terms of losses and recovery.

“International disruptions like these are the most effective way to degrade the most harmful cyber criminals, by removing the tools and services which underpin their operations.

“I would urge any businesses that may have been a victim of cyber crime to come forward and report such incidents to law enforcement.”

Cobalt Strike owners Fortra will continue to work with law enforcement to identify and remove older and malicious versions of the programme from the internet.

Advertisement
Gulfstream banner
Anti-drone tech patents surge

Aerospace Defence Security

Anti-drone tech patents surge

19 March 2026

The number of patent applications for anti-drone (counter-UAV) technologies filed globally increased by 27% to 126 last year*, up from 99 the year before, according to new research from intellectual property (IP) law firm Mathys & Squire.

Marshall Aerospace secures five SAIL Mark projects

Aerospace Defence Security

Marshall Aerospace secures five SAIL Mark projects

18 March 2026

Marshall Aerospace is advancing its expertise in the UK’s fast-growing unmanned aircraft systems (UAS) sector after securing five separate SAIL Mark assessment projects funded by Innovate UK and the Department for Transport.

UK engineers advance innovative way to tackle drone threats

Defence Security

UK engineers advance innovative way to tackle drone threats

18 March 2026

A team of UK based engineers is developing a new way of eliminating hostile drones.

Met Office launches MAVIS

Aerospace Security Space

Met Office launches MAVIS

18 March 2026

The Met Office have officially launched the Met Office Aeronautical Visualisation Service (MAVIS) - a next-generation aviation weather platform designed to support a rapidly evolving aviation landscape, from traditional crewed aircraft to emerging spaceport operations.

Advertisement
ODU RT
JFD opens new Singapore facility

Defence Security

JFD opens new Singapore facility

18 March 2026

Provider of specialist marine and defence solutions, James Fisher and Sons plc (JFD Global), has expanded its Asia Pacific footprint with the official opening of a new facility in Singapore.

Glasgow to host CYBERUK 2026

Security Events

Glasgow to host CYBERUK 2026

17 March 2026

International cyber security chiefs will convene next month at the Scottish Event Campus (SEC), Clydeside, Glasgow, for the UK’s flagship cyber conference, CYBERUK (21st-23rd April), to discuss accelerating defences in the face of rising online threats.

Advertisement
PTC rectangle
Advertisement
Gulfstream banner