Operation GhostSecret Data Theft Campaign
The HIDDEN COBRA advanced persistent threat group are believed to be conducting an ongoing campaign known as Operation GhostSecret.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
The HIDDEN COBRA advanced persistent threat group are believed to be conducting an ongoing campaign known as Operation GhostSecret.
Affected platforms
The following platforms are known to be affected:
Threat details
Initially focused on Turkish government and finance sectors, it has now evolved into a series of attacks on 17 countries including the UK.
Multiple malware tools with similarities to other known HIDDEN COBRA tools such as BANKSHOT are used. These tools have multiple capabilities, including:
- Listing files in a directory
- Creating processes
- Deleting files
- Transmitting data to a command and control (C2) server
- Gathering drive information
- Setting the current working directory for the implant
- Sending disk space information to a C2 server
A separate tool named Proxysvc is used to communicate with the C2 infrastructure, exfiltrating data and downloading further payloads using HTTP over SSL
Remediation advice
To prevent and detect infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 12:51 pm