The unauthorized use of Cobalt Strike, a powerful cybersecurity testing tool frequently exploited by cybercriminals, has dropped by 80% over the past two years, thanks to a coordinated global crackdown, security firm Fortra announced Friday.
A Long-Running Cyber Threat Targeted for Elimination
Cobalt Strike, originally developed in 2012 as an adversary simulation and penetration testing tool, is widely used by security professionals to detect vulnerabilities and test incident response protocols. However, older versions of the software have long been pirated and misused by cybercriminals, ransomware operators, and nation-state hackers.
Illicit versions of Cobalt Strike are typically deployed in spearphishing campaigns, where attackers use them to install beacons on victim devices. These beacons allow cybercriminals to profile networks, maintain persistence, and launch remote attacks—turning the tool into a weapon against the very infrastructure it was designed to secure.
Recognizing the escalating misuse, cybersecurity firm Fortra, alongside Microsoft and the Health Information Sharing and Analysis Center (Health-ISAC), launched a global effort in 2023 to disrupt illicit Cobalt Strike operations.
Legal and Technical Strike Against Cybercriminal Infrastructure
In March 2023, the U.S. District Court for the Eastern District of New York granted an order authorizing Microsoft, Fortra, and Health-ISAC to take direct action against criminal infrastructure associated with pirated versions of Cobalt Strike. This included:
- Identifying and disrupting command-and-control (C2) servers used in cyberattacks.
- Notifying internet service providers (ISPs) and Computer Emergency Readiness Teams (CERTs) to help take down criminal operations.
- Seizing malicious domains and IP addresses linked to unauthorized Cobalt Strike deployments.
Fortra detailed these efforts in a Friday blog post, revealing that the operation, dubbed “Morpheus”, culminated in July 2024 with a coordinated global takedown of known IP addresses and domain names tied to criminal use of Cobalt Strike.
Operation Morpheus: A Global Law Enforcement Effort
Led by the UK’s National Crime Agency, the operation flagged 690 IP addresses across 27 countries to online service providers. As of now, 593 of these have been taken down, significantly crippling cybercriminal operations.
The international crackdown was supported by law enforcement agencies in the United States, Australia, Canada, Germany, the Netherlands, and Poland, marking one of the most extensive efforts to combat weaponized cybersecurity tools.
The Impact: Cybercriminals Lose Access
Fortra’s efforts have resulted in a drastic decline in the availability of unauthorized Cobalt Strike copies, limiting their use in ransomware operations, state-sponsored cyberattacks, and healthcare breaches. The company reported:
- Over 200 malicious domains have been seized and sinkholed, cutting off attackers from their infrastructure.
- Dwell time (the period between detecting a malicious Cobalt Strike instance and taking it offline) has been reduced to less than one week in the U.S. and less than two weeks globally.
Fortra’s Associate Vice President Bob Erdman emphasized that working with Microsoft and law enforcement agencies has amplified the speed and scale of enforcement actions:
“Every unauthorized Cobalt Strike system taken down or domain name seized interrupts potential attacks across the globe. The additional involvement of global law enforcement organizations allows us to share intelligence and indicators of compromise (IOCs) in real-time for enforcement actions.”
Nation-State Actors and Ransomware Gangs Impacted
Microsoft had previously confirmed that nation-state groups from Russia, China, Vietnam, and Iran were among those using cracked versions of Cobalt Strike for cyber espionage and attacks on critical infrastructure.
Cobalt Strike has been deployed in dozens of ransomware attacks, including the 2022 attack on Costa Rica’s government, which forced the country into a state of emergency. The tool has also been linked to multiple healthcare sector cyberattacks, further underscoring the serious risks posed by its unauthorized use.
The Power of Global Cybercrime Collaboration
A Microsoft spokesperson highlighted that the successful reduction in illicit Cobalt Strike usage “underscores the power of collaboration in combating cybercrime.” This victory represents a critical milestone in efforts to dismantle cybercriminal infrastructure, but experts warn that attackers will continue to adapt and seek alternative tools.
Despite this progress, security professionals stress the importance of ongoing vigilance, stronger cyber defenses, and continued global cooperation to prevent the next wave of threats.
Help us bring real change! Corporate lobbying has corrupted our system for too long, and it’s time to take action. Please sign and share this petition—your support is crucial in restoring accountability to our government. Every signature counts! Thank you!
https://www.ipetitions.com/petition/restore-our-republic-end-lobbying

Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a


