Cyber Security News

Operation Sea Elephant Attacking Organizations to Steal Research Details

A sophisticated cyber espionage campaign dubbed “Operation Sea Elephant” has been discovered targeting scientific research organizations, with a particular focus on ocean-related studies.

The operation, attributed to a threat actor group known as CNC with South Asian origins, aims to steal valuable research data to ensure regional dominance in the Indian Ocean.

The CNC group has demonstrated significantly enhanced capabilities compared to other Advanced Persistent Threat (APT) groups operating in South Asia.

Their attacks have become increasingly modular and customized, allowing them to evade detection more effectively than their counterparts.

Security experts at Qiaxin discovered the campaign in mid-2024 when they identified an attack collection numbered UTG-Q-011, which shared code with previously known CNC operations.

Researchers have documented that the group primarily gains initial access through carefully crafted spear-phishing emails sent to targeted researchers.

After compromising a system, the attackers move laterally by controlling the victim’s instant messaging applications such as WeChat and QQ to distribute malicious programs to colleagues and associates.

Example of the camouflage image used by the USB propagation module to disguise malicious activity (Source – Qiaxin)

The technical sophistication of Operation Sea Elephant is evident in its various specialized modules.

One notable component is a USB propagation plugin that masquerades as legitimate software.

When analyzing this module, researchers found code that constantly monitors for newly connected USB drives:-

v182 = 0i64;
v183 = 15i64;
sub_7FF6D68B46B0(Buffer, 0, 0x100ui64)
GetLogicalDriveStringsA(0xFFu, Buffer[0].m128i_i8);
v29 = Buffer;
while ( 1 )
{
    v30 = *((_QWORD *)&v176 + 1);
LABEL_28:
    if ( !v29->m128i_i8[0] )
    break;
    Size = -1i64;
}

The attackers have designed multiple file exfiltration methods that target specific document types.

The system scans for files with extensions including .pdf, .doc, .docx, .ppt, .pptx, and .xls.

Only files larger than 40KB are collected, suggesting the attackers are filtering for documents with substantial content rather than simple placeholders or templates.

Stolen documents from compromised systems revealed the attackers’ interest in multiple marine research areas including inner wave water transport, ocean sequestration, and marine emerging industries.

While the stolen Windows-based documents did not contain production data, they provide foreign intelligence organizations with valuable insights into project progress, technical direction, and strategic planning of targeted research teams.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

GitAuto Strengthens Code Security By Automating QA At Scale

In the current software landscape, security breaches caused by untested or poorly tested code are…

35 minutes ago

Cybersecurity in Mergers and Acquisitions – CISO Focus

Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…

2 hours ago

Top Cybersecurity Trends Every CISO Must Watch in 2025

In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…

2 hours ago

Zero Trust Architecture – A CISO’s Blueprint for Modern Security

Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…

2 hours ago

Chrome 136 Released With Patch For 20-Year-Old Privacy Vulnerability

The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…

3 hours ago

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

13 hours ago