Skip to main content

Operation Cobalt Whisper: Threat Actor Targets Multiple Industries Across Hong Kong and Pakistan.

Low
Published: Thu Oct 24 2024 (10/24/2024, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: type
Product: osint

Description

Operation Cobalt Whisper: Threat Actor Targets Multiple Industries Across Hong Kong and Pakistan.

AI-Powered Analysis

AILast updated: 06/27/2025, 11:36:34 UTC

Technical Analysis

Operation Cobalt Whisper is a low-severity cyber threat campaign identified through open-source intelligence (OSINT) that targets multiple industries primarily in Hong Kong and Pakistan. The threat actor employs a multi-faceted attack approach leveraging spearphishing with malicious attachments (MITRE ATT&CK T1566.001), delivery of malicious files (T1204.002), and execution of Visual Basic scripts (T1059.005). Persistence is maintained through scheduled tasks (T1053.005), and the attacker uses portable executable injection techniques (T1055.002) to evade detection and maintain foothold. The campaign includes system owner/user discovery (T1033) to gather information about compromised environments and uses web protocols (T1071.001) for command and control communications. The targeted sectors are diverse, including academia, civil aviation, defense, electric and energy utilities, engineering, environmental organizations, IT security firms, pharmacy, and security actors, indicating a broad strategic interest in critical infrastructure and sensitive information. While no specific vulnerabilities or exploits have been identified, the campaign’s use of spearphishing and malicious file execution highlights the reliance on social engineering and user interaction to initiate compromise. The absence of patch availability and known exploits in the wild suggests this is an emerging or ongoing threat rather than a vulnerability with a known fix. The campaign’s low severity rating reflects limited impact or sophistication observed to date but does not preclude escalation or broader targeting in the future.

Potential Impact

For European organizations, the direct impact of Operation Cobalt Whisper may currently be limited due to its geographic focus on Hong Kong and Pakistan. However, the sectors targeted—such as civil aviation, defense, energy, and IT security—are critical and have global interdependencies. European entities operating in or with partners in these regions could face indirect risks, including supply chain compromise, espionage, or disruption of services. The use of spearphishing and malicious attachments poses a risk to user credentials and network integrity, potentially leading to data breaches, intellectual property theft, or operational disruptions. Given the campaign’s targeting of multi-sector environments, European organizations in similar sectors should be vigilant against similar tactics, as threat actors often adapt campaigns to new regions. The persistence and stealth techniques employed could enable prolonged unauthorized access, increasing the risk of data exfiltration and sabotage. The low severity rating suggests current impact is limited, but the potential for escalation or expansion into Europe exists, especially in sectors with strategic importance or geopolitical relevance.

Mitigation Recommendations

European organizations should implement targeted defenses against spearphishing and malicious file attacks beyond generic advice. This includes deploying advanced email filtering solutions capable of detecting and quarantining spearphishing attempts with malicious attachments, and employing sandboxing technologies to analyze suspicious files before delivery. Endpoint detection and response (EDR) tools should be configured to monitor for execution of Visual Basic scripts and unusual scheduled tasks indicative of persistence mechanisms. Network monitoring should focus on detecting anomalous web protocol traffic that could signal command and control communications. User training programs must emphasize recognition of spearphishing tactics specific to the sectors targeted, including simulation exercises tailored to the threat actor’s methods. Organizations should enforce strict application whitelisting to prevent unauthorized execution of injected portable executables and implement least privilege principles to limit the impact of compromised accounts. Regular audits of scheduled tasks and system owner/user discovery activities can help identify early signs of compromise. Collaboration with national cybersecurity centers and sharing of threat intelligence related to Operation Cobalt Whisper can enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Uuid
b2a90426-2dc0-4022-b51e-8be190ffb7e5
Original Timestamp
1733752769

Indicators of Compromise

File

ValueDescriptionCopy
file%windir%\\syswow64\\dllhost.exe
Spawnto_x86
file%windir%\\sysnative\\dllhost.exe
Spawnto_x64
fileImeBroker.exe
filePressMe.pdf
filemalicious.rar
filename is a placeholder - do not use for detection
file附件1:《2024年度中国电工技术学会科学技术奖推荐提名书》(技术发明奖和科技进步奖)填报说明(2024年8月新版).pdf.lnk
filecache.bak
fileO365.vbs
filesubscription.db
file附件2:《中国电工技术学会科学技术奖励办法》(2024年4月修订).pdf
translates to “Attachment 2: Regulations on Scientific and Technological Awards of the China Electrotechnical Society (Revised April 2024)
filesigverif.exe
file科学技术奖填报说明和奖励办法修订版.rar
file最新停车场收费标准调整方案.rar
file╒δ╢╘í╢│Θ╦«╨ε─▄╡τ╒╛╩Σ╦«╖ó╡τ╧╡═│╖╜░╕╔Φ╝╞▒╚╤í╤╨╛┐í╖╡─╨▐╕─╜¿╥Θ.zip
file╣π╕µ═╢╖┼╥¬╟≤╩Θ.zip
file预加油航班管理方法研究与软件实现(修改意见).rar
fileaaa.zip
file贾哲文-云南大学-环境工程.rar
file刘潇-清华大学-计算机.rar
file李新宇-北京大学-2026毕业-金融硕士.rar
file热核聚变发电岛三回路参数优化研究(修改意见).rar
file国家互联网应急中心CCSC认证邀请函_海关信息中心.rar
file异构平台要素协同理论方法研究(修改意见).rar
file博士后申请-王玉玺-华中科技大学-电气与电子工程-博士.rar
file企业资质材料.zip
file针对《苍术倍半萜类化合物生物合成的研究进展》的修改建议.rar
file中债数据无法使用情况.rar
file参编《人工智能通用大模型合规管理体系 指南》申请表.rar
file中国外汇交易中心信息产品许可表.rar
fileIslamabad_Security_Dialogue_Pub.rar
fileIDEAS_2024_Calling_Letter.zip
fileFinal_Combined_Forecast_MCP_FY_2024_25.zip
fileFinal_Combined_Forecast_MCP_FY_2024_25.pdf.lnk
file12th_Edition_Of_Innovation_&_Excellence_IDEAS_2024.pdf.lnk
file附件1:《2024年度中国电工技术学会科学技术奖推荐提名书》(技术发明奖和科技进步奖)填报说明(2024年8月新版).pdf.lnk
file最新停车场收费标准调整方案.lnk
file╒δ╢╘í╢│Θ╦«╨ε─▄╡τ╒╛╩Σ╦«╖ó╡τ╧╡═│╖╜░╕╔Φ╝╞▒╚╤í╤╨╛┐í╖╡─╨▐╕─╜¿╥Θ.docx.lnk
file预加油航班管理方法研究与软件实现(修改意见).docx.lnk
file电影宣传要求.pdf.lnk
file需使用中债数据.jpg.lnk
file贾哲文-云南大学-环境工程.docx.lnk
file刘潇-清华大学-计算机科学与技术学院-硕士.pdf.lnk
filefilename.lnk
file李新宇-北京大学-2026毕业-金融硕士.pdf.lnk
file修改建议.docx.lnk
fileIslamabad_Security_Dialogue_Pub.pdf.lnk
file热核聚变发电岛三回路参数优化研究(修改意见).docx.lnk
file国家互联网应急中心CCSC认证邀请函_海关信息中心.pdf.lnk
file异构平台要素协同理论方法研究(修改意见).docx.lnk
file博士后申请-王玉玺-华中科技大学-电气与电子工程博士-简历.pdf.lnk
file针对《苍术倍半萜类化合物生物合成的研究进展》的修改建议.docx.lnk
file中债数据无法使用情况.jpg.lnk
file参编《人工智能通用大模型合规管理体系 指南》申请表.pdf.lnk
file中国外汇交易中心信息产品许可表.doc.lnk
fileO365.vbs
filecache.vbs
fileDS_Store.vbs
fileO365.vbs
fileDS_Store.vbs
fileDS_Store.vbs
fileDS_Store.vbs
fileDS_Store.vbs
filecache.vbs
filecache.vbs
filecache.vbs
filecache.vbs
fileAnx.vbs
filecal.vbs
filecal.vbs
fileO365.vbs
fileDS_Store.vbs
filecache.vbs
fileO365.vbs
fileDS_Store.vbs
fileDS_Store.vbs
fileDS_Store.vbs
fileDS_Store.vbs
fileDS_Store.vbs
filecache.vbs
filecache.vbs
filecache.vbs
filecache.vbs
filecache.vbs
filecache.vbs
filecache.vbs
filecache.vbs
fileDS_Store.vbs
filecache.vbs
filesubscription.db
file附件2:《中国电工技术学会科学技术奖励办法》(2024年4月修订).pdf
file│Θ╦«╨ε─▄╡τ╒╛╩Σ╦«╖ó╡τ╧╡═│╖╜░╕╔Φ╝╞▒╚╤í╤╨╛┐_╦╬╫╙╞µ.pdf
filecache.db
file╡τ╙░╨√┤½╥¬╟≤.pdf / 电影宣传要求.pdf
filesubscription.db
file贾哲文-云南大学-环境工程.docx
filecache.db
filecache.db
file企业资质证明(请先解密).pptx
file12th_Edition_Of_Innovation_&_Excellence_IDEAS_2024.pdf
file预加油航班管理方法研究与软件实现.pdf
file需使用中债数据.jpg
file刘潇-清华大学-计算机科学与技术学院-硕士.pdf
file李新宇-北京大学-2026毕业-金融硕士.pdf
file热核聚变发电岛三回路参数优化研究.pdf
filecache.db
file异构平台要素协同理论方法研究.pdf
filecache.db
fileJPCS-2021-A_novel_current_differential_protection_for_MMC-HV.pdf
file论文及荣誉证书/电力系统自动化-2024-逆变型新能源场站送出线时域方向元件.pdf
fileIET-2022-A simplified model of Type‐4 wind turbine for short‐circuit currents simulation analysis.pdf
file论文及荣誉证书/教育部学籍在线验证报告-王玉玺.png
fileIslamabad_Security_Dialogue_Pub.pdf
fileFinal_Combined_Forecast_MCP_FY_2024_25.pdf
file苍术倍半萜类化合物生物合成的研究进展_冯铃芳.pdf
filesubscription.db
file中债数据无法使用情况.jpg
file参编《人工智能通用大模型合规管理体系 指南》申请表.pdf
filecache.db
file联系方式.txt
file联系方式.txt
file清华通知.txt
fileImeBroker.exe
filecache.bak
fileImeBroker.exe
filecache.bak
fileDevicesFlow.EXE
fileDS_Store
fileImeBroker.exe
filecache.bak
fileMicrosoft IME
fileDS_Store
filecharmap.exe
fileDS_Store
fileCTTUNE.EXE
fileDS_Store
fileImeBroker.exe
filecache.bak
fileImeBroker.exe
filecache.bak
fileImeBroker.exe
filecache.bak
fileImeBroker.exe
filecache.bak
filesigverif.exe
file企业资质材料/企业签名解密专用解密工具.exe
fileD:\MyPrograms\vs2022\vt01\vt\x64\Release\vt.pdb
filekeycongif.exe
fileAnx
fileAdobbee.exe
filecal
fileImeBroker.exe
filecache.bak
fileBioEnrollmentHost.exe
fileDS_Store
fileDevicesFlow.EXE
fileDS_Store
fileimecfmui.exe
filecache.bak
fileImeBroker.exe
filecache.bak
fileImeBroker.exe
filecache.bak
fileImeBroker.exe
filecache.bak
fileImeBroker.exe
filecache.bak
fileImeBroker.exe
filecache.bak
fileImeBroker.exe
filecache.bak
filesigverif.exe
fileImeBroker.exe
filecache.bak
filesigverif.exe

Regkey

ValueDescriptionCopy
regkey“C:\LLVM\bin\LnkFishing\.asset\.asset.pdf“

Ip

ValueDescriptionCopy
ip43.137.69.76
ip139.155.190.198
ip106.55.77.71
ip129.204.98.221
ip119.45.2.30
ip119.45.67.241
ip119.45.2.56
ip139.155.190.84
ip139.155.190.84

Domain

ValueDescriptionCopy
domainservice-a8vp3r65-1319584009.cd.tencentapigw.com
domainservice-c2y0jtba-1319584009.gz.tencentapigw.com.cn
domainservice-qgezbin5-1319584009.sh.tencentapigw.com
domainservice-h87kxr41-1319584009.bj.tencentapigw.com.cn
domainservice-cyuasu6k-1319584009.nj.tencentapigw.com
domainservice-3z1ebnpd-1319584009.sh.tencentapigw.com
domainservice-b4ibcyjt-1325935989.sh.tencentapigw.com
domainservice-k6iylaqt-1319584009.bj.tencentapigw.com.cn
domainservice-7wu3p58s-1319584009.nj.tencentapigw.com
domainservice-a8vp3r65-1319584009.cd.tencentapigw.com

Link

ValueDescriptionCopy
linkhttps://www.seqrite.com/blog/operation-cobalt-whisper-targets-industries-hong-kong-pakistan/

Text

ValueDescriptionCopy
textSEQRITE Labs APT-Team has recently uncovered a campaign targeting various industries such as the Defense Sector in Pakistan and predominantly researchers from Hong Kong. Tracked as Operation Cobalt Whisper, the entire campaign heavily leverages the use of a post-exploitation tool Cobalt Strike, which is deployed using obfuscated VBScript. A total of 20 infection chains have been identified so far along with additional individual samples, where 18 of them target Hong Kong and two target Pakistan where over 30 decoy files have been identified. In this blog, we will explore the technical details of one of the campaigns we encountered during our initial analysis and examine the various stages of the infection chain, starting with a deep dive into the decoy documents. We will then look into the common Tactics, Techniques, and Procedures (TTPs), such as the use of malicious VBScript and LNK payloads employed by this threat actor across most campaigns. These methods facilitate the in-memory execution of the Cobalt Strike implant, which is delivered alongside these lures in an archive file.
textOperation Cobalt Whisper: Threat Actor Targets Multiple Industries Across Hong Kong and Pakistan.
textBlog
textChina

Port

ValueDescriptionCopy
port443

As

ValueDescriptionCopy
as45090

Hash

ValueDescriptionCopy
hash86543a984e604430fb7685a1e707b2c4
hash95557088474250a9749b958c3935dee4
hash95f05674e4cb18a363346b488b67fd38
hashb8c94d2f66481cc52b30948f65fed761
hash4cf9bd6af64c3937e156ffb20537a6c1
hashb2649134fbf0520222263d73b7e985d8
hashaf669dfa074eb9b6fda3fd258f58e2d2
hash865483fea76242e687aa9e76b1a37f28
hash432230af1d59dac7dfb47e0684807240
hashb9d04a61b30ddf53b28bf58a86fc28f5
hash2d478e4527486d85932254c7a7413951
hashe08dcbbd3e2ab9bcc2c02c44b6a97870
hashfe4c575abf70ad11cdbce0b0821ee681
hash68278e47f36a44d9a8bbd46b74422bbe
hash58f5ff5be4e765e62758b1f3e679a2ac
hash955841a4d2315422818b47aec6ce51fb
hash75def3a25b1d355c9163d3c247990867
hash343a3944218a040089fa7131112c1681
hashb28bb7cabfb12e9bc5b87692b065c83a
hash7728fee377137e83e9bd1c609cc166c0
hashdad7d9528e9506ebd0524b3ebd89ddf2
hasha02a664f80d9011e38c45762683771c0
hashd73a5c11423923d8a8c483cf6172f7e2
hash22c07c76020f9311385cfaa97a2d6adb
hash7a494f7448bc350bb46fb7f21450d1d9
hash3c3986899bdb4890ea6d44c00538e2fd
hash74ca14032a93be59098d607ba7039660
hashcd14d51d27f294c2e60d1bc3ef907160
hashdb08274efb374e2196a9f46961c8d8f8
hash62eb90df5ee3a3b443c277d12b893141
hash41b5d5a04cf4534550e6ac3fc9a8f42d
hashae55cb4988f2f45197132631f5a86632
hash5ae488083403cd69002c29ef6326cca7
hash72011305317d7e9d38a0e75650f22e34
hash473adee7068573fd01862b4bf43979e6
hash10d0a351df1bfe57494ac18a7f2edec1
hash10d6fb6ab395001a4424058a52c3c69f
hash1070fc4a998cb7515842fb1b647340be
hash1b538fef54102fd36e83e4fc549f960e
hashc8231c5709ca548f1fe70f3b61d3537a
hash955a8b63723eb35686ddce6cbfe890cf
hashda623c5ca61e25c6205904a5cb91bd55
hashafc805006390b00713898c09d50343b6
hash0a34cc8983fb581a59308135868b75d0
hash5d18995193465c618844949f0ff9c786
hash4c409d7201ec5dccf55a8ea54b0de101
hash39ab2053406493b9a0d81ed40212ffa8
hash4711d0d163c00158abd4b20177d68b9a
hash3dce8d8f9664c755448413cbfe1bc08f
hash3b573c2229b43bde50f998f6cba17f2f
hash318a1a18df75b49f72fbcc020384cc24
hasha0d760492c0193d14114792f0c3fff7a
hashcafdc03dcbe06ac43ec25fb38c1e013f
hashd13828ae89a7dab34d2f380eef518332
hash7e98bb7ffba4cf12d29132a2c71973eb
hashc3d460ac3a93e86782c2bc374aa5ecd2
hash93eafad827126a9d12fc1d0e6e21aaef
hasha4a47dd08cf59f8b6a7c907cf0e39029
hashb2c882f6121d758cfcd4ece31834f497
hash86e4c5d39dda20eee4dd8f794be04c80
hashe7f3c33a5cd569ebf4b57381f03c5337
hash7ac5daaa5fe4e59137271eaf97c9e692
hasha2f64bafeafbeb303d24fd6ed1f5a89a
hash8ba5b61454a29e09e7f536e85c951f53
hash4eeeb2b40e7189c271098c515b8f91d8
hash3711e1913f2ae74c4fc765bc28dbc60f
hashe112698125e67a1a6f26597371cae502
hash67dc90468327a0c733ca48881084593b
hashd68fb3502e63ef3ca91c45f508d146b9
hash91b7328a6064706fa9f125621a09f648
hashbfd61e5e133b2cd592d42ecdbc0eaee2
hashe5e709be4584031aefdc2a0782017f8f
hashcf59916d271dce7f44bbf349464a31e2
hash5d18995193465c618844949f0ff9c786
hashe213dc8060794bb97c5f94f563107e88
hashd01e7c41140aeff82ad87a558ae96587
hashde3a0ff11c7645f5d0ac717b0eb98e52
hash98b85b474c02ce8c0a33ad7507abbf2a
hash5368f0b6ff56cce0de42165f14067427
hash22ce60653860fe33bdfc47ce60deb681
hashb69c075caff565528bf42705d936a066
hash477c5abea7299891b7f7c487f8636613
hash298a27e24e4ca917020fa5a230fe6c8f
hash820485d456ce6bfab933a1b662ff590a
hash55467fcb1b51477104442e74d7baf3df
hashab1bc05e7f110042d7eacda5724918e0
hash8423873a0eee6139c1eb6d5a9919121b
hash6833e934c675717a0581472e00cb6d93
hash9294dd350f921745602f745e501e8e43
hash43bed053851e7a182b99835bcd1d2d16
hash154bf965c1c8e54540179b2d01c4202e
hash1fbffdc19d3cfee158558e266206f46f
hash8bdd5587b9863bdb154d9db85c67037b
hash05770b4da4f87150f2faf6c4e821f727
hashc5b2970e227e311abb5acf480bc48934
hashedd1a870a0eea3bf9dcbd88ece487920
hash1c2126ea78d3430ce04bf96b0d1c524e
hash13097891c790fbd3df75a2aebf993b16
hash23bd40035a9a9fd1d31a1c7aceda1727
hash7763e73dd2e877c4770c0f10e4d3a1dd
hash162a9b9aee469b8de10c37c6311906cd
hashe8db7191c84a84717bffd0f1af9de36c
hash91611a155d4722d178f7697cd4ddd95f
hash75c1403abfbe9f5c92625a1baf8b22f5
hashd967a709472775c118ec339963c1d940
hash154141caa12b828ace18fd4b3fda77e0
hashc116a1971593a3a5468eb972b505fb57
hash63d4015195c5006d81e14a85aa2459c4
hasha3df3505d89c15bb3940062f7abd786b
hash041d01a5495cdede35f4ad8e1fe437f7
hashd29980f768aafdcf102cf1b3741c8a2b
hash2acfad6fd814b02683038d21ba3eccbe
hash1aa1f12d26d3a34265d0b99705bdf283
hashe7550dd2db4dbe1a2cc1dadc47846cd0
hash1d109c8bb9e6ad16cd5f6813db39c21a
hashd8c348a2f27097d8689dba4452bb76eb
hash14df06539b72837adb9f8d13cfcea6db
hash6388625810652f0767be13b43363c10d
hashe8d3540212384d45ba9d7135c5bf8d8e
hash352e299fc3f2327bfad5026b4a56b7cb
hash73fa6149e68dd7842f7cfce78dd732c5
hash3813e4ebddd87615c1adc9c05888341d
hash316e8d798f7db625c207532e2f7a5d38
hash5e7dba4aafb8176ab026e2f4aa3211dd
hash33b3e322679f1500a9f3c162e4b25040
hash2694553347f23e250ed70a8c23096d8f
hash800be8a4989d4b7ed07ddd068c6469f1
hashbfd6c2f0787865ecb1604439ea9a5f15
hash49c5553995f032195890b5bfc2abcb00
hashae9d676e4eda5cfa18a061e4bc2b1637
hash008255c14420420e9a53c9959d0d08b8
hash49a9c56fab34795b7e6e4c0b6185ca3e
hashd901fa81a4b3d83219440b80a1c338bc
hash88b8bbe04b53e4af857cd1c032968c94
hash1d065492e7b5d118e31e571cc53dfe65

Threat ID: 68367c09182aa0cae2310861

Added to database: 5/28/2025, 2:59:21 AM

Last enriched: 6/27/2025, 11:36:34 AM

Last updated: 8/14/2025, 2:59:29 AM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats