Operation Sea Elephant Attacking Organizations to Steal Research Details

A sophisticated cyber espionage campaign dubbed “Operation Sea Elephant” has been discovered targeting scientific research organizations, with a particular focus on ocean-related studies. The operation, attributed to a threat actor group known as CNC with South Asian origins, aims to steal valuable research data to ensure regional dominance in the Indian Ocean. While the stolen Windows-based documents did not contain production data, they provide foreign intelligence organizations with valuable insights into project progress, technical direction, and strategic planning of targeted research teams. Stolen documents from compromised systems revealed the attackers’ interest in multiple marine research areas including inner wave water transport, ocean sequestration, and marine emerging industries. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Security experts at Qiaxin discovered the campaign in mid-2024 when they identified an attack collection numbered UTG-Q-011, which shared code with previously known CNC operations. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. The CNC group has demonstrated significantly enhanced capabilities compared to other Advanced Persistent Threat (APT) groups operating in South Asia. Only files larger than 40KB are collected, suggesting the attackers are filtering for documents with substantial content rather than simple placeholders or templates. After compromising a system, the attackers move laterally by controlling the victim’s instant messaging applications such as WeChat and QQ to distribute malicious programs to colleagues and associates.

This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 07 Mar 2025 12:35:09 +0000


Cyber News related to Operation Sea Elephant Attacking Organizations to Steal Research Details

Sea Turtle APT Group Exploiting Vulnerabilities Attack IT-service - To obtain access to a variety of clients' systems and data in a single attack, hackers frequently target IT service providers. Cybersecurity security researchers at Hunt & Hackett recently discovered that the Turkish espionage APT group Sea Turtle ...
1 year ago Cybersecuritynews.com
Turkish APT Sea Turtle Resurfaces, Spies on Dutch IT Firms - Sea Turtle, a group of hackers aligned with the Turkish government, has returned after going undetected since 2020. Dutch cybersecurity provider, Hunt & Hackett, reported on January 5, 2024, that Sea Turtle has been conducting multiple espionage ...
1 year ago Infosecurity-magazine.com
Operation Sea Elephant Attacking Organizations to Steal Research Details - A sophisticated cyber espionage campaign dubbed “Operation Sea Elephant” has been discovered targeting scientific research organizations, with a particular focus on ocean-related studies. The operation, attributed to a threat actor group ...
4 months ago Cybersecuritynews.com
Turkish hackers Sea Turtle expand attacks to Dutch ISPs, telcos - The Turkish state-backed cyber espionage group tracked as Sea Turtle has been carrying out multiple spying campaigns in the Netherlands, focusing on telcos, media, internet service providers, and Kurdish websites. Previously, Sea Turtle, also known ...
1 year ago Bleepingcomputer.com
Navigating Security Research: A Comprehensive Guide - As technology and digital data become more prominent in our lives, securing the means and methods of managing our data is paramount. With cyber-attacks becoming increasingly sophisticated, it is important for those responsible for data protection to ...
2 years ago Thehackernews.com
Turkish APT 'Sea Turtle' Resurfaces to Spy on Kurdish Opposition - A group aligned with the interests of the government of Turkey has been turning up its politically motivated cyber espionage lately, targeting Kurdish opposition groups through high-value supply chain targets in Europe, the Middle East, and North ...
1 year ago Darkreading.com
The law enforcement operations targeting cybercrime in 2023 - In 2023, we saw numerous law enforcement operations targeting cybercrime operations, including cryptocurrency scams, phishing attacks, credential theft, malware development, and ransomware attacks. While some of these operations were more successful ...
1 year ago Bleepingcomputer.com
Elephant APT Group Attacking Defense Industry Leveraging VLC Player, and Encrypted Shellcode - The malware creates a mutex named “ghjghkj” to prevent multiple instances and implements seven distinct command handlers, including screenshot capture (3SC3), file upload (3ngjfng5), and remote code execution (3gjdfghj6) capabilities, ...
1 day ago Cybersecuritynews.com
Turkish Cyberspies Targeting Netherlands - A state-supported cyberespionage group likely affiliated to Turkey has been observed targeting numerous public and private entities in the Netherlands for intelligence gathering, Dutch incident response provider Hunt & Hackett reports. Over the past ...
1 year ago Securityweek.com
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
2 years ago Bleepingcomputer.com
Bioinformatics: Revolutionizing Healthcare and Research - Bioinformatics plays a crucial role in decoding complex biological data to drive advancements in healthcare and research. In the realm of healthcare technology, bioinformatics is essential for personalized medicine, where treatments are tailored to ...
1 year ago Securityzap.com
Beware of Fake Tax Claims that Tricks Users to Steal Over $10,000 From Victims - Scammers exploit generational gaps: younger victims are often baited via social media links, whereas older adults face voice phishing (vishing) calls using deepfake audio to simulate family emergencies. For example, Form W-2 fraud surged in 2025, ...
4 months ago Cybersecuritynews.com
Cybersecurity Performance Goals: Assessing How CPGs Help Organizations Reduce Cyber Risk - In October 2022, CISA released the Cybersecurity Performance Goals to help organizations of all sizes and at all levels of cyber maturity become confident in their cybersecurity posture and reduce business risk. Earlier this summer, CISA outlined ...
1 year ago Cisa.gov
U.S DOE Announces $70 Million Funding for Improving - Funding that will support research into tech Today, the U.S. Department of Energy announced funding of up to $70 million to support research into technologies intended to reduce risks and increase resilience to energy delivery infrastructure from a ...
1 year ago Cysecurity.news
OpenAI says Deep Research is coming to ChatGPT free "very soon" - As pointed out by Tibor Blaho on X,  while discussing the Deep Research feature, Isa Fulford, Member of Technical Staff at OpenAI, confirmed that the company is testing Deep Research for free customers and will share more details soon. ...
3 months ago Bleepingcomputer.com
FBI disrupts Blackcat ransomware operation, creates decryption tool - The Department of Justice announced today that the FBI successfully breached the ALPHV ransomware operation's servers to monitor their activities and obtain decryption keys. On December 7th, BleepingComputer first reported that the ALPHV, aka ...
1 year ago Bleepingcomputer.com LockBit Noescape
The Future of IT: Info-Tech 2024 Conference - PRESS RELEASE. TORONTO, Jan. 9, 2024 /PRNewswire/ - Info-Tech Research Group, a global leader in IT research and advisory, has announced that its flagship annual conference, Info-Tech LIVE, will be hosted this year at Bellagio in Las Vegas from ...
1 year ago Darkreading.com
How Healthcare Organizations can use ASPM to Fill CSPM Coverage Gaps and Save Money - In recent years, healthcare organizations have increasingly moved their healthcare information systems applications and infrastructure to the cloud to take advantage of its scalability, flexibility and cost-effectiveness. To mitigate these risks, ...
1 year ago Securityboulevard.com
A Dream Come True: My Journey to Africa as a Sea Turtle Conservation Volunteer - I had this longtime dream of volunteering in Africa and working with sea turtles. This year, I had the chance to fulfill my dream because of this incredible company. Cisco incentivizes employees to give back - providing us with 80 hours of paid time ...
1 year ago Feedpress.me
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
4 weeks ago Cybersecuritynews.com
The Top 5 Ransomware Takedowns - Learn about the recent achievements in the fight against ransomware as law enforcement agencies and cybersecurity organizations successfully disrupt operations, seize infrastructure, and safeguard victims from further attacks. Trigona ransomware, a ...
1 year ago Securityboulevard.com Trigona Ragnar Locker
Week in review: Cybersecurity job openings, hackers use 1-day flaws to drop custom Linux malware - Transitioning to memory-safe languages: Challenges and considerationsIn this Help Net Security interview, Omkhar Arasaratnam, General Manager at the Open Source Security Foundation, discusses the evolution of memory-safe programming languages and ...
1 year ago Helpnetsecurity.com LockBit
Claroty Team82: 63% of Known Exploited Vulnerabilities Tracked by CISA Are on Healthcare Organization Networks - PRESS RELEASE. NEW YORK and ORLANDO, Fla., March 12, 2024/PRNewswire/ -Claroty, the cyber-physical systems protection company, released today at the annual HIMSS24 conference a new report that uncovered concerning data about the security of medical ...
1 year ago Darkreading.com
North Korea Launches New Military Based Research Center To Strengthen Hacking Capabilities - The center is designed to research and develop international cyber hacking technologies, representing a substantial shift in the country’s approach to information warfare. The establishment of Research Center 227 comes amid increasing ...
4 months ago Cybersecuritynews.com
Compliance Management In 2025: Ensuring Your Security Strategy Meets Regulatory Demands - When selecting and implementing a compliance management system, organizations should prioritize scalability to accommodate future growth, seamless integration with existing enterprise systems, user-friendly interfaces to encourage widespread ...
2 months ago Cybersecuritynews.com

Latest Cyber News


Cyber Trends (last 7 days)